SECURITY ADVISORY FOR MELTDOWN & SPECTRE VULNERABILITIES



! SECURITY ADVISORY FOR MELTDOWN & SPECTRE VULNERABILITIES

All machines every Intel processor which implements out-of-order execution is potentially affected by Meltdown vulnerability and all modern processors (Intel, AMD, and ARM processors) capable of keeping many instructions in flight are potentially vulnerable to the Spectre vulnerability.
High level description:
MELTDOWN

The bug basically melts security boundaries which are normally enforced by the hardware. Meltdown exploits side effects of out-of-order execution on modern processors to read arbitrary kernel-memory locations including personal data and passwords. The attack is independent of the operating system, and it does not rely on any software vulnerabilities.

SPECTRE
The name is based on the root cause, speculative execution. Spectre attacks involve inducing a victim to speculatively perform operations that would not occur during correct program execution and which leak the victim’s confidential information via a side channel to the adversary.
Detailed Description:

Questions

MELTDOWN

SPECTRE


Differences

Meltdown breaks the mechanism that keeps applications from accessing arbitrary system memory

Spectre tricks other applications into accessing arbitrary locations in their memory


Why is it called

The bug basically melts security boundaries which are normally enforced by the hardware.

The name is based on the root cause, speculative execution.

CVE

CVE-2017-5754

CVE-2017-5753 and CVE-2017-5715


Which systems are affected

Every Intel processor which implements out-of-order execution is potentially affected, which is effectively every processor since 1995 (except Intel Itanium and Intel Atom before 2013).

All modern processors capable of keeping many instructions in flight are potentially vulnerable

Verified on the following

Intel processors

Intel, AMD, and ARM processors



Cloud Providers affected

Cloud providers which use Intel CPUs and Xen PV as virtualization without having patches applied. Furthermore, cloud providers without real hardware virtualization, relying on containers that share one kernel, such as Docker, LXC, or OpenVZ are affected.

NA

  
Criticality: VERY HIGH!

Systems affected:
·         Intel processors
·         AMD, and ARM processors

Note: Desktops, Laptops, Cloud Servers and Smartphones running the above-mentioned processors

Potential Impact:

MELTDOWN
ü  passwords, encryption keys, logins, credit card information can be stolen.

SPECTRE
ü  Memory of a (vulnerable) application can be read and password, logins, credit card information and any confidential data (bank A/C Number, Credit/Debit card numbers) can be accessed.

Recommendation for Network and IT Team:

v  Only Windows 10 Updates are from 04/01/2018
v  Check your PC OEM website for support information and firmware updates and apply any immediately. 
v  Users and admins who are comfortable editing Registry keys themselves can manually perform the task by setting the following:
Key="HKEY_LOCAL_MACHINE"Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat"
Value Name="cadca5fe-87d3-4b96-b7fb-a231484277cc"
Type="REG_DWORD”
Data="0x00000000”
v  Current remediation is not available for Google Chrome an Update for Chrome is scheduled on January 23rd by Google or Firefox 57 if you use either browser.
  • Symantec has reported that updating the ERASER engine to 117.3.0 and applying Microsoft Update KB4056892 is causing system tray issues at the moment and Symantec is working on a solution to resolve the issue.

Note: Updates for other windows OS will be available soon.
References:

Meltdown in Action:

Comments

Popular posts from this blog

Payment Gateway Security Testing Checklist

Network Security VAPT Checklist

How to dump Database using Sqlmap