Updated 7:30 PM ET: Researchers have now disclosed two new exploits that impact virtually all modern processors from ARM, Intel, and AMD. Microsoft has also issued an emergency patch for Windows users.
Initial reports suggested that the security flaw, which reportedly would allow attackers to access sensitive information such as passwords and files cached on a disk, affects Intel processors released over the past 10 years. However, in its response, Intel says that the issue isn't unique to Intel products, and the company is working with other vendors on a solution. From Intel:
Intel also used its response to push back on the idea that forthcoming fixes will have a "significant" impact on performance.
For its part, ARM has confirmed in a statement to Fortune that it is working with Intel and AMD on mitigating the attack. Further, the ARM spokesperson stressed that "this is not an architectural flaw; this method only works if a certain type of malicious code is already running on a device and could at worst result in small pieces of data being accessed from privileged memory."
AMD also confirmed to Fortune that its chips were affected by some related security exploits, but the company pressed that "due to differences in AMD's architecture, we believe there is a near zero risk to AMD processors at this time."
You can read Intel's full response below:
This is why you wipe down monthly and microwave those ram chips boys and girls.
Waiting for apple's response to this, they've been very quiet
As they've always been. They never disclose anything. They just issue an update, label it security update and voila.
"Intel is working closely with many other technology companies... and several operating system vendors, to develop an industry-wide approach" Such mature beauty, finally ❤
""Check with your operating system vendor """
My phone's OS vendor is making apps for other vendors' operating systems.
Get the best of Windows Central in in your inbox, every day!
Thank you for signing up to Windows Central. You will receive a verification email shortly.
There was a problem. Please refresh the page and try again.