This article will discuss Meltdown and Spectre. These are two big security flaws.
Because of these security issues, it only makes sense that the IT industry is in an uproar. And that’s because millions of computers and servers are now shown to be vulnerable.
What Are Meltdown and Spectre?
“Meltdown” and “Spectre” are the given names for the data security issues unearthed by researchers.
These issues affect all modern processors and therefore nearly every computing device. Although they especially pose a threat to data centers and multi-user networks.
If you are getting rid of old processors that have data security issues, make sure to get paid what your processors are worth. Also, be sure that secure data erasure is a part of the process.
How Do These Data Security Issues Work?
Meltdown and How it Works
Meltdown breaks one of the most fundamental aspects of security in any computer: Isolation.
In Layman’s terms, every modern operating system makes sure that applications can’t read each others’ memories. They also prevent user apps from writing to or reading kernel memory. This feature is one of the foundations of security in computing.
With present-age processors, this isolation between the kernel and user processes is determined by a supervisor bit in the processor. This supervisor bit says if a memory page in the kernel is accessible or not.
The supervisor bit is only supposed to be set when inputting kernel code, or code to the most sensitive part of the computer. When it swaps back to user processes, it’s supposed to be cleared.
Because of this feature, the OS can map the kernel into the address space of every process. It can make transitions from user processes to the kernel very smoothly. And in theory, without any funny business occurring.
Meltdown provides a method to overcome this barrier. It allows any user process to read all of the kernel memory for the machine that it’s running on. This includes all memory-mapped inside the kernel area.
Because this flaw works through a hardware defect and doesn’t rely on any software to function, this exploit can be used on any operating system.
Thankfully, patches have been released for the Meltdown vulnerability. However, software fixes will cause a decrease in system performance.
KAISER is the primary one for Linux. Windows is releasing its own set of patches. Although there are conflicts with certain third-party antiviruses.
How Spectre Exploits Data Security
Spectre attacks, on the other hand, involve inducing a victim to speculatively perform operations that would not occur during correct program execution.
These operations leak the victim’s confidential information via a side-channel to the adversary.
In more simple terms, Spectre abuses a feature of modern processors called “speculative execution.”
Speculative execution is a process that allows for faster speeds. Here’s how it works:
When the processor hits a snag, like waiting to retrieve a value from memory, it tries to “guess” the next execution path in the meantime, or essentially what it’s going to do next.
Before it does this, it saves a checkpoint of where it was before it went to execute its guess.
In this example, once the processor is done waiting to retrieve the value, it can check if its “guess” was correct.
If the guess was incorrect, it reverts everything back to its “checkpoint.”
If the guess was correct, then the executions it made to that effect are committed to, and the processor saved itself a significant amount of time.
In the past, since the processor is set to revert from any incorrect guesses, the general consensus was that it wouldn’t be a security problem.
However, the Spectre flaw exploits the processor in the time it’s doing speculative execution, or “guessing” its future execution paths.
Essentially, the hacker tricks the processor into guessing that it wants to leak sensitive data. The hacker can then retrieve this data before the processor realizes its guess was incorrect and reverts back to the checkpoint.
Spectre is harder to exploit than Meltdown, but it is difficult to patch.
What do Meltdown and Spectre mean for Data Centers?
Large networks and data center environments are uniquely vulnerable to cyber attacks as a result of this bug.
One reason is that the vulnerabilities could allow a hacker to break out of one user’s process to hijack other processes and users on the same shared server.
This means that instead of just one user being at risk, one attack could expose every user on the network at once. With many of those users having access to millions of confidential records, the flaw is potentially catastrophic. It could be a huge debacle for many of the largest hosting companies, cloud companies, and other data centers.
When discussing Data Center Security you must update yourself with all the best tools to protect your data from network attacks.
What Do Meltdown and Spectre Mean for the Processor Market?
One important thing to note is that while Spectre attacks are universal to CPUs in general, Intel CPUs are significantly more vulnerable to the Meltdown exploit.
This will inevitably cause a shift in the market towards AMD processors over Intel processors.
It’s a safe bet that more security-conscious companies will try to sell CPUs off in quantity and replace their equipment with more secure versions.
Intel has lost billions in stock, while AMD’s stock has climbed significantly since the news broke.
Data centers and corporations, in general, will look to reinforce and diversify their chip architecture by bringing more AMD chips into their server environments.
Look for the value of AMD CPUs on the market to climb and the value of Intel CPUs to fall.
That large percentage of companies planning a data center decommissioning project, data center consolidation, or data center liquidation will probably be more inclined to let their Intel processors go.
These companies will probably choose the AMD lines when faced with any redundancies.
Have something to add? Let us know your thoughts in the comments below!