humble3d Posted March 15, 2018 Share Posted March 15, 2018 The Complete List Of CPUs Affected By Meltdown + Spectre The speculative execution CPU bug that literally kneecapped Intel, also affects many AMD and ARM processors. This means BILLIONS of CPUs around the world, including those powering smartphones, are affected by Meltdown and/or Spectre. The Meltdown and Spectre CPU flaws that the Google Project Zero team discovered are arguably the worst we have ever known. These vulnerabilities were built into BILLIONS of CPUs that we have been using for the last decade or so. Not just Intel CPUs, but also CPUs made by AMD, Apple and ARM. Even those that power our smartphones and other smart devices! Let’s take a look at what we know so far about Meltdown and Spectre, how they affect you, and what we can do about them. This story is still developing. We will update the article as and when new details emerge. Be sure to check back and refresh the page for the latest information! Everything On The Meltdown + Spectre CPU Flaws! The Meltdown + Spectre Vulnerabilities The Project Zero team identified these vulnerabilities in 2017, reporting it to Intel, AMD and ARM on 1 June 2017. These vulnerabilities take advantage of the Speculative Execution and Branch Prediction features of the modern processor, that have been used for many years to improve performance. Speculative Execution lets the CPU predict and pre-execute the next instruction, allowing it to “instantly” deliver the results if it’s correct. Branch Prediction helps the CPU predict future execution paths that should be speculatively-executed for better performance. There are THREE (3) variants of the speculative execution CPU bug : Variant 1 : Bounds Check Bypass (CVE-2017-5753) Variant 2 : Branch Target Injection (CVE-2017-5715) Variant 3 : Rogue Data Cache Load (CVE-2017-5754) The Spectre attack (whitepaper) exploits variants 1 and 2. The Meltdown attack (whitepaper) exploits variant 3. There is a Variant 3a, which appears to affect only certain ARM processors. What’s The Difference Between Meltdown & Spectre? Spectre tricks the CPU branch predictor into mis-predicting the wrong path, thereby speculatively executing code that would not otherwise be executed. Meltdown takes advantage of the out-of-order execution capability of modern processors, tricking them into executing malicious code that would normally not be allowed. The Spectre name is based on both the root cause – speculative execution, and the fact that it is not easy to fix, and will haunt us for a long time like a spectre (ghost). The Meltdown name was chosen because the vulnerability “basically melts security boundaries which are normally enforced by the hardware“. How Bad Are Meltdown & Spectre? The Spectre exploits let an attacker access and copy information from the memory space used by other applications. The Meltdown exploit lets an attacker copy the entire physical memory of the computer. Unless patched, the affected processors are vulnerable to malware and cyberattacks that exploits this CPU bug to steal critical information from running apps (like login and credit card information, emails, photos, documents, etc.) While the Meltdown exploit can be “fixed”, it is likely that the Spectre exploit cannot be fixed, only mitigated, without a redesign of the processors. That means we will have to live with the risks of a Spectre attack for many more years to come. How Many Processors Are Affected? Updated! For the complete list of affected AMD, Apple, ARM and Intel processors, please see this separate article – The Complete List Of CPUs Vulnerable To Meltdown / Spectre via the link below... Company Spectre 1 Spectre 2 Meltdown AMD 295 Server CPUs 42 Workstation CPUs 396 Desktop CPUs 208 Mobile CPUs 295 Server CPUs 42 Workstation CPUs 396 Desktop CPUs 208 Mobile CPUs None Apple 13 Mobile SoCs 13 Mobile SoCs 13 Mobile SoCs ARM 10 Mobile CPUs 3 Server SoCs 10 Mobile CPUs 3 Server SoCs 4 Mobile CPUs 3 Server SoCs IBM 10 POWER CPUs 10 POWER CPUs 10 POWER CPUs Intel 732 Server / Workstation CPUs 443 Desktop CPUs 583 Mobile CPUs 51 Mobile SoCs 732 Server / Workstation CPUs 443 Desktop CPUs 583 Mobile CPUs 51 Mobile SoCs 732 Server / Workstation CPUs 443 Desktop CPUs 583 Mobile CPUs 51 Mobile SoCs Total 2786 CPUs 2786 CPUs 1839 CPUs For the complete list of affected AMD, Apple, ARM and Intel processors, please see this separate article – The Complete List Of CPUs Vulnerable To Meltdown / Spectre Intel Detection Tool? The Intel-SA-00086 Detection Tool does NOT detect the processor’s susceptibility to these vulnerabilities. It only checks for different vulnerabilities affecting the Intel Management Engine. InSpectre Our reader Arthur shared that the Gibson Research Corporation has an aptly-named utility called InSpectre. It checks for Meltdown and Spectre hardware and software vulnerabilities in a Windows system. It will help you check if your system is getting patched properly against these vulnerabilities. What Is Being Done??? Updated! via the link below... Note : The terms “mitigate” and “mitigation” mean the possibility of a successfully attacked are reduced, not eliminated. Intel has started issuing software and firmware updates for the processors introduced in the last 5 years. By the middle of January 2018, Intel expects to have issued updates for more than 90% of those CPUs. However, that does not address the other Intel processors sold between 2010 and 2012. Microsoft and Linux have started to roll our the KPTI (Kernel Page Table Isolation) patch, also known as the KAISER (Kernel Address Isolation to have Side-channels Efficiently Removed) patch. The KPTI or KAISER patch, however, will only protect against the Meltdown exploit. It has no effect on a Spectre attack. Microsoft Edge and Internet Explorer 11 received the KB4056890 security update on 3 January 2018, to prevent a Meltdown attack. Firefox 57 includes changes to mitigate against both attacks. Google Chrome 64 will be released on 23 January 2018, with mitigations against Meltdown and Spectre attacks. For Mac systems, Apple introduced mitigations against Spectre in macOS 10.13.2 (released on 8 January 2018), with more fixes coming in macOS 10.13.3. For iOS devices, Apple introduced mitigations against Meltdown in iOS 11.2 and tvOS 11.2. On 8 January 2018, Apple released iOS 11.2.2, which mitigates the risk of the two Spectre exploits in Safari and WebKit, for iPhone 5s, iPad Air, and iPod touch 6th generation or later. ARM has made available the KPTI / KAISER kernel patches for Linux, while Google will provide them for Android. Google patched Android against both exploits with the December 2017 and January 2018 patches. Google shared details of their Return Rrampoline (Retpoline) binary modification technique that can be used to protect against Spectre attacks. It is a software construct that ensures that any associated speculative execution will “bounce” (as if on a trampoline) endlessly. NVIDIA issued six driver and security updates for affected devices and software between 3-9 January 2018. On 11 January 2018, AMD announced that the “majority of AMD systems” have received the mitigation patches against Spectre 1, albeit some older AMD systems got bricked by bad patches. They also announced that they will make “optional” microcode updates available for Ryzen and EPYC processors by the same week. In the same 11 January 2018 disclosure, AMD also shared that Linux vendors have started to roll out OS patches for both Spectre exploits, and they’re working on the “return trampoline (Retpoline)” software mitigations as well. On 23 January 2018, Apple released Meltdown patches for macOS Sierra and OS X El Capitan, but not macOS High Sierra. On 23 January 2018, Microsoft finally revealed their Spectre and Meltdown patch schedule. On 24 January 2018, AMD revealed their 11 software mitigations for both Spectre exploits. The 24 January 2018 AMD whitepaper also revealed that the AMD K10 and K8 processors are vulnerable as well, adding an additional 663 CPU models to the list of vulnerable processors. On 2 February 2018, Microsoft released KB4078130 to disable the Spectre 2 patches that were causing many Intel systems to randomly and spontaneously reboot. On 8 February 2018, an Intel microcode update schedule revealed that their Penryn-based processors are also vulnerable, adding an additional 314 CPU models to the list of vulnerable processors. On 14 February 2018, Intel revealed an expanded Bug Bounty Program, offering up to $250,000 in bounty awards. Some AMD PCs Got Bricked In the rush to mitigate against Meltdown and Spectre, Microsoft released Windows 10 patches that bricked some AMD PCs. They blamed the incorrect / incomplete documentation provided by AMD. You can read more about this issue @ These Windows 10 Updates Are Bricking AMD PCs! Buggy Intel Spectre 2 Patches Updated! Intel’s rush to patch Meltdown and Spectre resulted in buggy microcode patches, causing several generations of their CPUs to randomly and spontaneously reboot. So far, over 800 Intel CPU models have been identified to be affected by these spontaneous reboot issues. If you have one of the affected CPUs, please hold off BIOS / firmware updates! Intel has identified the cause as the Spectre 2 patches in their microcode updates for some of these processors. They’re still investigating the cause of the other affected CPU models. Fortunately for Windows users, Microsoft issued the KB4078130 emergency update to stop the reboots while Intel worked to fix the issue. You can read more about this issue @ The Intel Spectre Reboot Issue, and the Microsoft solution @ KB4078130 : Emergency Windows Update To Disable Intel Spectre Patches! What Should You Do? Updated! First and foremost – DO NOT PANIC. There is no known threat or attack using these exploits. Although we listed a number of important patches below, the buggy updates are worse than the potential threat they try to fix. So we advise HOLDING OFF these patches, and wait for properly-tested versions a few weeks down the line. If you are using Windows, make sure you install the latest Microsoft Spectre and Meltdown updates. If you are using a Mac system, get the latest Apple Spectre and Meltdown patches. If you are using an iOS device, get updated to iOS 11.2 or tvOS 11.2. If you are using Firefox, update to the latest Firefox 57. If you are using Google Chrome, make sure you watch out for Chrome 64, which will be released on 23 January. Download and install the latest software firmware updates from your PC, laptop, motherboard brands. In particular, install the latest driver for the Intel Management Engine (Intel ME), the Intel Trusted Execution Engine (Intel TXE), and the Intel Server Platform Services (SPS) If you are running an ARM processor on Linux, grab the kernel patches. IBM POWER system users can download and install these firmware updates. Users of affected NVIDIA systems can download and install these driver and firmware updates. If you are using an Intel system, hold off updating your firmware, unless you have already verified that your CPU is not affected by the buggy Intel patches, or Intel has already issued corrected patches. The Performance Impact Of The Mitigation Patches Many benchmarks have been released, showing performance impacts of between 5% to 30%, depending on the type of benchmark and workload. Microsoft has called those benchmark results into question, stating that they did not cover both operating system and silicon microcode patches. They released an initial report on their findings, which we have summarised in our article – Pre-2016 Intel CPUs Hit Worst By Meltdown + Spectre Fix. Meltdown + Spectre Reading Suggestions Everything On The Meltdown + Spectre CPU Flaws! The Complete List Of CPUs Vulnerable To Meltdown / Spectre The Microsoft Spectre + Meltdown Patch Schedule The Intel Spectre Reboot Issue – Everything You Need To Know! Intel Penryn CPUs Also Vulnerable To Meltdown + Spectre The Complete AMD Spectre Mitigation Strategy Guide The Apple Spectre + Meltdown Patches Detailed These Windows 10 Updates Are Bricking AMD PCs! Pre-2016 Intel CPUs Hit Worst By Meltdown + Spectre Fix Yes, AMD CPUs Are Also Vulnerable To Spectre 2 Exploit AMD K10 And K8 Processors Also Vulnerable To Spectre KB3078130 : Emergency Windows Update To Disable Intel Spectre Patches! https://www.techarp.com/articles/meltdown-spectre-cpu-flaws/ THE LIST: Tech ARP Reviews Articles Events News Guides BIOS Guide Forums Guides Complete List Of CPUs Vulnerable To Meltdown / Spectre Rev. 8.0 Posted by Dr. Adrian Wong Date: March 07, 2018 in: Guides (11) Comments Intel Desktop CPUs Affected By Meltdown + Spectre Intel Desktop CPUs Vulnerable To Meltdown + Spectre Affected Variants : These Intel CPUs are affected by all three variants of the speculative execution CPU bug. They are vulnerable to the Meltdown and both Spectre exploits. Intel Coffee Lake-S (2017) Intel Core i7-8700K Intel Core i7-8700 Intel Core i5-8600K Intel Core i5-8400 Intel Core i3-8350K Intel Core i3-8100 Intel Gemini Lake (2017) Intel Pentium Silver J5005 Intel Celeron J4105 Intel Celeron J4005 Intel Denverton (2017) Intel Celeron C3958 Intel Celeron C3955 Intel Celeron C3950 Intel Celeron C3858 Intel Celeron C3850 Intel Celeron C3830 Intel Celeron C3808 Intel Celeron C3758 Intel Celeron C3750 Intel Celeron C3708 Intel Celeron C3558 Intel Celeron C3538 Intel Celeron C3508 Intel Celeron C3338 Intel Celeron C3308 Intel Kaby Lake-X (2017) Intel Core i7-7740X Intel Core i5-7640X Intel Kaby Lake-S (2017) Intel Core i7-7700K Intel Core i7-7700 Intel Core i7-7700T Intel Core i5-7600K Intel Core i5-7600 Intel Core i5-7600T Intel Core i5-7500 Intel Core i5-7500T Intel Core i5-7400 Intel Core i5-7400T Intel Core i3-7350K Intel Core i3-7320 Intel Core i3-7300 Intel Core i3-7300T Intel Core i3-7101T Intel Core i3-7101TE Intel Core i3-7100 Intel Core i3-7100T Intel Pentium G4620 Intel Pentium G4600 Intel Pentium G4600T Intel Pentium G4560 Intel Pentium G4560T Intel Celeron G3950 Intel Celeron G3930 Intel Celeron G3930T Intel Celeron G3930E Intel Celeron G3930TE Intel Skylake-X (2017) Intel Core i9-7980XE Intel Core i9-7960X Intel Core i9-7940X Intel Core i9-7920X Intel Core i9-7900X Intel Core i7-7820X Intel Core i7-7800X Intel Apollo Lake (2016) Intel Pentium J4205 Intel Pentium J3455 Intel Pentium J3355 Intel Celeron J3455 Intel Celeron J3355 Intel Atom x5-E3950 Intel Atom x5-E3940 Intel Atom x5-E3930 Intel Skylake-H (2016) Intel Core i7-6785R Intel Core i5-6685R Intel Core i5-6585R Intel Braswell (2016) Intel Pentium J3710 Intel Celeron J3160 Intel Celeron J3060 Intel Atom x5-E8000 Intel Broadwell-E (2016) Intel Core i7-6950X Intel Core i7-6900K Intel Core i7-6850X Intel Core i7-6800X Intel Skylake-S (2015) Intel Core i7-6700K Intel Core i7-6700 Intel Core i7-6700T Intel Core i7-6700TE Intel Core i5-6600K Intel Core i5-6600 Intel Core i5-6600T Intel Core i5-6500 Intel Core i5-6500T Intel Core i5-6500TE Intel Core i5-6402P Intel Core i5-6400 Intel Core i5-6400T Intel Core i3-6320 Intel Core i3-6300 Intel Core i3-6300T Intel Core i3-6100 Intel Core i3-6100T Intel Core i3-6100TE Intel Core i3-6098P Intel Pentium G4520 Intel Pentium G4500 Intel Pentium G4500T Intel Pentium G4400 Intel Pentium G4400T Intel Pentium G4400TE Intel Celeron G3920 Intel Celeron G3902E Intel Celeron G3900 Intel Celeron G3900T Intel Celeron G3900E Intel Celeron G3900TE Intel Broadwell-H (2015) Intel Core i7-5775C Intel Core i7-5775R Intel Core i5-5675R Intel Core i5-5675C Intel Core i5-5575R Intel Haswell-E (2014) Intel Core i7-5960X Intel Core i7-5930K Intel Core i7-5820K Intel Haswell-H (2013) Intel Core i7-4770R Intel Core i5-4670R Intel Core i5-4570R Intel Haswell-DT (2013) Intel Core i7-4790K Intel Core i7-4790 Intel Core i7-4790S Intel Core i7-4790T Intel Core i7-4785T Intel Core i7-4771 Intel Core i7-4770K Intel Core i7-4770 Intel Core i7-4770S Intel Core i7-4770T Intel Core i7-4770TE Intel Core i7-4765T Intel Core i5-4690K Intel Core i5-4690 Intel Core i5-4690S Intel Core i5-4690T Intel Core i5-4670K Intel Core i5-4670 Intel Core i5-4670S Intel Core i5-4670T Intel Core i5-4590 Intel Core i5-4590S Intel Core i5-4590T Intel Core i5-4570 Intel Core i5-4570S Intel Core i5-4570T Intel Core i5-4570TE Intel Core i5-4460 Intel Core i5-4460S Intel Core i5-4460T Intel Core i5-4440 Intel Core i5-4440S Intel Core i5-4430 Intel Core i5-4430S Intel Core i3-4370 Intel Core i3-4370T Intel Core i3-4360 Intel Core i3-4360T Intel Core i3-4350 Intel Core i3-4350T Intel Core i3-4340 Intel Core i3-4340TE Intel Core i3-4330 Intel Core i3-4330T Intel Core i3-4330TE Intel Core i3-4170 Intel Core i3-4170T Intel Core i3-4160 Intel Core i3-4160T Intel Core i3-4150 Intel Core i3-4150T Intel Core i3-4130 Intel Core i3-4130T Intel Pentium G3470 Intel Pentium G3460 Intel Pentium G3460T Intel Pentium G3450 Intel Pentium G3450T Intel Pentium G3440 Intel Pentium G3440T Intel Pentium G3430 Intel Pentium G3420 Intel Pentium G3420T Intel Pentium G3320TE Intel Pentium G3260 Intel Pentium G3260T Intel Pentium G3258 Intel Pentium G3250 Intel Pentium G3250T Intel Pentium G3240 Intel Pentium G3240T Intel Pentium G3220 Intel Pentium G3220T Intel Celeron G1850 Intel Celeron G1840 Intel Celeron G1840T Intel Celeron G1830 Intel Celeron G1820 Intel Celeron G1820T Intel Celeron G1820TE Intel Bay Trail-D (2013) Intel Celeron J1900 Intel Celeron J1850 Intel Celeron J1800 Intel Celeron J1750 Intel Bay Trail-I (2013) Intel Atom E3845 Intel Atom E3827 Intel Atom E3826 Intel Atom E3825 Intel Atom E3815 Intel Atom E3805 Intel Ivy Bridge-E (2012) Intel Core i7-4960X Intel Core i7-4960K Intel Core i7-4820K Intel Ivy Bridge (2012) Intel Core i7-3770K Intel Core i7-3770 Intel Core i7-3770S Intel Core i7-3770T Intel Core i5-3570K Intel Core i5-3570 Intel Core i5-3570S Intel Core i5-3570T Intel Core i5-3550 Intel Core i5-3550S Intel Core i5-3475S Intel Core i5-3470 Intel Core i5-3470S Intel Core i5-3470T Intel Core i5-3450 Intel Core i5-3450S Intel Core i5-3350P Intel Core i5-3440 Intel Core i5-3440S Intel Core i5-3335S Intel Core i5-3330 Intel Core i5-3330S Intel Core i3-3250 Intel Core i3-3250T Intel Core i3-3245 Intel Core i3-3240 Intel Core i3-3240T Intel Core i3-3225 Intel Core i3-3220 Intel Core i3-3220T Intel Core i3-3210 Intel Pentium G2140 Intel Pentium G2130 Intel Pentium G2120 Intel Pentium G2120T Intel Pentium G2100T Intel Pentium G2030 Intel Pentium G2030T Intel Pentium G2020 Intel Pentium G2020T Intel Pentium G2010 Intel Celeron G1630 Intel Celeron G1620 Intel Celeron G1620T Intel Celeron G1610 Intel Celeron G1610T Intel Sandy Bridge-E (2011) Intel Core i7-3970X Intel Core i7-3960K Intel Core i7-3930K Intel Core i7-3820 Intel Sandy Bridge (2011) Intel Core i7-2700K Intel Core i7-2600K Intel Core i7-2600 Intel Core i7-2600S Intel Core i5-2550K Intel Core i5-2500K Intel Core i5-2500 Intel Core i5-2500S Intel Core i5-2500T Intel Core i5-2450P Intel Core i5-2405S Intel Core i5-2400 Intel Core i5-2400S Intel Core i5-2390T Intel Core i5-2370P Intel Core i5-2320 Intel Core i5-2310 Intel Core i5-2300 Intel Core i3-2130 Intel Core i3-2125 Intel Core i3-2120 Intel Core i3-2120T Intel Core i3-2105 Intel Core i3-2102 Intel Core i3-2100 Intel Core i3-2100T Intel Pentium G870 Intel Pentium G860 Intel Pentium G860T Intel Pentium G850 Intel Pentium G840 Intel Pentium G645 Intel Pentium G645T Intel Pentium G640 Intel Pentium G640T Intel Pentium G632 Intel Pentium G630 Intel Pentium G630T Intel Pentium G622 Intel Pentium G620 Intel Pentium G620T Intel Celeron G555 Intel Celeron G550 Intel Celeron G550T Intel Celeron G540 Intel Celeron G540T Intel Celeron G530 Intel Celeron G530T Intel Celeron G470 Intel Celeron G465 Intel Celeron G460 Intel Celeron G440 Intel Gulftown (2010) Intel Core i7-990X Intel Core i7-980X Intel Core i7-980 Intel Core i7-970 Intel Clarksdale (2010) Intel Core i5-680 Intel Core i5-670 Intel Core i5-661 Intel Core i5-660 Intel Core i5-655K Intel Core i5-650 Intel Core i3-560 Intel Core i3-550 Intel Core i3-540 Intel Core i3-530 Intel Pentium G6960 Intel Pentium G6951 Intel Pentium G6950 Intel Celeron G1101 Intel Lynnfield (2009) Intel Core i7-880 Intel Core i7-875K Intel Core i7-870 Intel Core i7-870S Intel Core i7-860 Intel Core i7-860S Intel Core i5-760 Intel Core i5-750 Intel Core i5-750S Intel Bloomfield (2008) Intel Core i7-975 Extreme Edition Intel Core i7-965 Extreme Edition Intel Core i7-960 Intel Core i7-950 Intel Core i7-940 Intel Core i7-930 Intel Core i7-920 Intel Yorkfield-6M (2008-2010) Intel Core 2 Quad Q9705 Intel Core 2 Quad Q9700 Intel Core 2 Quad Q9505S Intel Core 2 Quad Q9505 Intel Core 2 Quad Q9500 Intel Core 2 Quad Q9400S Intel Core 2 Quad Q9400 Intel Core 2 Quad Q9300 Intel Core 2 Quad Q8400S Intel Core 2 Quad Q8400 Intel Core 2 Quad Q8300 Intel Core 2 Quad Q8200S Intel Core 2 Quad Q8200 Intel Yorkfield (2008-2009) Intel Core 2 Quad Q9650 Intel Core 2 Quad Q9550S Intel Core 2 Quad Q9550 Intel Core 2 Quad Q9450S Intel Core 2 Quad Q9450 Intel Wolfdale (2008-2009) Intel Core 2 Duo E8700 Intel Core 2 Duo E8600 Intel Core 2 Duo E8500 Intel Core 2 Duo E8400 Intel Core 2 Duo E8300 Intel Core 2 Duo E8290 Intel Core 2 Duo E8200 Intel Core 2 Duo E8190 Intel Wolfdale-3M (2008-2010) Intel Core 2 Duo E7600 Intel Core 2 Duo E7500 Intel Core 2 Duo E7400 Intel Core 2 Duo E7300 Intel Core 2 Duo E7200 Intel Pentium E6800 Intel Pentium E6700 Intel Pentium E6600 Intel Pentium E6500K Intel Pentium E6500 Intel Pentium E6300 Intel Pentium E5800 Intel Pentium E5700 Intel Pentium E5500 Intel Pentium E5400 Intel Pentium E5300 Intel Pentium Dual-Core E5300 Intel Pentium E5200 Intel Pentium Dual-Core E5200 Intel Pentium Dual-Core E2210 Intel Celeron E3500 Intel Celeron E3400 Intel Celeron E3300 Intel Celeron E3200 Intel Allendale (2008-2009) Intel Celeron E1600 Intel Celeron E1500 Intel Celeron E1400 Intel Celeron E1200 Intel Yorkfield-XE (2007-2008) Intel Core 2 Extreme QX9775 Intel Core 2 Extreme QX9770 Intel Core 2 Extreme QX9650 Intel Conroe-L (2007-2008) Intel Celeron 450 Intel Celeron 445 Intel Celeron 430 Intel Celeron 420 Intel Celeron 220 Intel Kentsfield (2007) Intel Core 2 Quad Q6700 Intel Core 2 Quad Q6600 Intel Core 2 Quad Q6400 Intel Conroe-CL (2007) Intel Core 2 Duo E6405 Intel Core 2 Duo E6305 Intel Celeron 445 Intel Conroe (2006-2008) Intel Core 2 Duo E6850 Intel Core 2 Duo E6750 Intel Core 2 Duo E6700 Intel Core 2 Duo E6600 Intel Core 2 Duo E6550 Intel Core 2 Duo E6540 Intel Core 2 Duo E6420 Intel Core 2 Duo E6400 Intel Core 2 Duo E6320 Intel Core 2 Duo E6300 Intel Core 2 Duo E4700 Intel Core 2 Duo E4600 Intel Core 2 Duo E4500 Intel Core 2 Duo E4400 Intel Core 2 Duo E4300 Intel Pentium Dual-Core E2220 Intel Pentium Dual-Core E2200 Intel Pentium Dual-Core E2180 Intel Pentium Dual-Core E2160 Intel Pentium Dual-Core E2140 Intel Kentsfield-XE (2006-2007) Intel Core 2 Extreme QX6850 Intel Core 2 Extreme QX6800 Intel Core 2 Extreme QX6700 Continue: Intel Mobile CPUs Affected By Meltdown + Spectre Contents 1. The Complete List Of CPUs Affected By Meltdown + Spectre 2. AMD Workstation, Desktop & Mobile CPUs Vulnerable To Spectre 3. AMD Mobile CPUs Vulnerable To Spectre 4. Apple, ARM & Intel CPUs Affected By Meltdown & Spectre 5. Intel Server / Workstation CPUs Vulnerable To Meltdown + Spectre 6. Intel Desktop CPUs Affected By Meltdown + Spectre 7. Intel Mobile CPUs Affected By Meltdown + Spectre 8. VIA Desktop + Mobile CPUs Vulnerable To Meltdown + Spectre Everything On The Meltdown + Spectre CPU Flaws! Rev. 3.0 Everything On The Meltdown + Spectre CPU Flaws! Rev. 3.0 f February 2018 In "Articles" These Windows 10 Updates Are Bricking AMD PCs! Rev. 4.0 These Windows 10 Updates Are Bricking AMD PCs! Rev. 4.0 f January 2018 In "Articles" Pre-2016 Intel CPUs Hit Worst By Meltdown + Spectre Fix Pre-2016 Intel CPUs Hit Worst By Meltdown + Spectre Fix f January 2018 In "Articl. Tags:AMDappleARMBugBug fixComputer securityCPUCybersecurityData SecurityDesktop CPUIntelMediaTekMeltdownMobile CPUMobile SecurityProcessorQualcommSamsungSecurity bugServer CPUSmartphoneSpectre Previous : New Samsung Galaxy S9 Bixby Features Demonstrated! Next : Acer Aspire S 24 AIO + Three Acer Monitors Revealed! About The Author Dr. Adrian Wong Related posts via the link below... How To Reindex Your Website Using Google Search Console How To Reindex Your Website Using Google Search Console March 13, 2018 How To Detect + Fix Sitemap Problems In Google Search Console How To Detect + Fix Sitemap Problems In Google Search Console March 13, 2018 The Complete AMD Spectre Mitigation Strategy Guide Rev. 2.0 The Complete AMD Spectre Mitigation Strategy Guide Rev. 2.0 February 28, 2018 The Microsoft Spectre + Meltdown Patch Schedule Rev. 2.0 The Microsoft Spectre + Meltdown Patch Schedule Rev. 2.0 February 23, 2018 LIST SOURCE: https://www.techarp.com/guides/complete-meltdown-spectre-cpu-list/6/ --MORE-- Research papers: https://meltdownattack.com Link to comment Share on other sites More sharing options...
humble3d Posted March 15, 2018 Author Share Posted March 15, 2018 Questions & Answers Am I affected by the vulnerability? Most certainly, yes. Can I detect if someone has exploited Meltdown or Spectre against me? Probably not. The exploitation does not leave any traces in traditional log files. Can my antivirus detect or block this attack? While possible in theory, this is unlikely in practice. Unlike usual malware, Meltdown and Spectre are hard to distinguish from regular benign applications. However, your antivirus may detect malware which uses the attacks by comparing binaries after they become known. What can be leaked? If your system is affected, our proof-of-concept exploit can read the memory content of your computer. This may include passwords and sensitive data stored on the system. Has Meltdown or Spectre been abused in the wild? We don't know. Is there a workaround/fix? There are patches against Meltdown for Linux ( KPTI (formerly KAISER)), Windows, and OS X. There is also work to harden software against future exploitation of Spectre, respectively to patch software after exploitation through Spectre ( LLVM patch, MSVC, ARM speculation barrier header). Which systems are affected by Meltdown? Desktop, Laptop, and Cloud computers may be affected by Meltdown. More technically, every Intel processor which implements out-of-order execution is potentially affected, which is effectively every processor since 1995 (except Intel Itanium and Intel Atom before 2013). We successfully tested Meltdown on Intel processor generations released as early as 2011. Currently, we have only verified Meltdown on Intel processors. At the moment, it is unclear whether AMD processors are also affected by Meltdown. According to ARM, some of their processors are also affected. Which systems are affected by Spectre? Almost every system is affected by Spectre: Desktops, Laptops, Cloud Servers, as well as Smartphones. More specifically, all modern processors capable of keeping many instructions in flight are potentially vulnerable. In particular, we have verified Spectre on Intel, AMD, and ARM processors. Which cloud providers are affected by Meltdown? Cloud providers which use Intel CPUs and Xen PV as virtualization without having patches applied. Furthermore, cloud providers without real hardware virtualization, relying on containers that share one kernel, such as Docker, LXC, or OpenVZ are affected. What is the difference between Meltdown and Spectre? Meltdown breaks the mechanism that keeps applications from accessing arbitrary system memory. Consequently, applications can access system memory. Spectre tricks other applications into accessing arbitrary locations in their memory. Both attacks use side channels to obtain the information from the accessed memory location. For a more technical discussion we refer to the papers ( Meltdown and Spectre) Why is it called Meltdown? The vulnerability basically melts security boundaries which are normally enforced by the hardware. Why is it called Spectre? The name is based on the root cause, speculative execution. As it is not easy to fix, it will haunt us for quite some time. Is there more technical information about Meltdown and Spectre? Yes, there is an academic paper and a blog post about Meltdown, and an academic paper about Spectre. Furthermore, there is a Google Project Zero blog entry about both attacks. What are CVE-2017-5753 and CVE-2017-5715? CVE-2017-5753 and CVE-2017-5715 are the official references to Spectre. CVE is the Standard for Information Security Vulnerability Names maintained by MITRE. What is the CVE-2017-5754? CVE-2017-5754 is the official reference to Meltdown. CVE is the Standard for Information Security Vulnerability Names maintained by MITRE. https://meltdownattack.com Link to comment Share on other sites More sharing options...
sixoclock Posted March 15, 2018 Share Posted March 15, 2018 Regarding the fixes and patches, what are the differences between the Intel microcode updates, Windows security updates, and OEM BIOS updates? Link to comment Share on other sites More sharing options...
SPECTRUM Posted March 15, 2018 Share Posted March 15, 2018 1 hour ago, sixoclock said: Regarding the fixes and patches, what are the differences between the Intel microcode updates, Windows security updates, and OEM BIOS updates? simply Windows Updates = defense by kernel Intel microcode updates = defence by CPU microcode OEM Bios updates = defende by BIOS security so the best is update all for security in each area. Link to comment Share on other sites More sharing options...
sixoclock Posted March 15, 2018 Share Posted March 15, 2018 3 minutes ago, SPECTRUM said: simply Windows Updates = defense by kernel Intel microcode updates = defence by CPU microcode OEM Bios updates = defende by BIOS security so the best is update all for security in each area. From my understanding, if you update either the microcode or BIOS, Window updates are no longer needed, is that correct? I want to avoid the Window updates because they are cumulative and rollup, which break my custom machine. Used to be able to selectively choose Window security updates until they introduced cumulative and rollup updates Link to comment Share on other sites More sharing options...
SPECTRUM Posted March 15, 2018 Share Posted March 15, 2018 32 minutes ago, sixoclock said: From my understanding, if you update either the microcode or BIOS, Window updates are no longer needed, is that correct? I want to avoid the Window updates because they are cumulative and rollup, which break my custom machine. Used to be able to selectively choose Window security updates until they introduced cumulative and rollup updates Windows Updates are needed anyway. as I told you previously update all for best security, consider it as 3 walls of security… microcode+bios+kernel. cumulative and rollup updates shouldn't broke your machine unless you have damaged system files or broken permissions in folders/files/registry. Link to comment Share on other sites More sharing options...
Skunk1966 Posted March 15, 2018 Share Posted March 15, 2018 42 minutes ago, sixoclock said: I want to avoid the Window updates because they are cumulative and rollup, which break my custom machine go here for security-only updates: https://www.askwoody.com/forums/topic/2000003-ongoing-list-of-group-b-monthly-updates-for-win7-and-8-1/ Link to comment Share on other sites More sharing options...
Administrator DKT27 Posted March 17, 2018 Administrator Share Posted March 17, 2018 Even though we know all of them are affected, but still a great list this. Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.