{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2018-001.pdf"
    },
    "title": "UPDATE Meltdown and Spectre Critical Vulnerabilities",
    "serial_number": "2018-001",
    "publish_date": "11-01-2018 09:39:00",
    "description": "Design flaws in modern computer processors allow programs to steal data processed on the computer. The hardware design deficiencies leaded to the development of two attack scenarios: Meltdown, melts security boundaries normally enforced by the processors hardware, and Spectre, which abuses speculative execution leading to information disclosure.",
    "url_title": "2018-001",
    "content_markdown": "---\ntitle: '_Meltdown_ and _Spectre_ Critical\u00a0Vulnerabilities'\nversion: '1.1'\nnumber: '2018-001'\ndate: 'January 11, 2018'\n---\n\n_History:_\n\n* _08/01/2018 --- v1.0: Initial publication_\n* _11/01/2018 --- v1.1: Some corrections and additional sources added_\n\n# Summary\n\nDesign flaws in modern computer processors allow programs to steal data processed on the computer. The hardware design deficiencies leaded to the development of two attack scenarios:\n\n**Meltdown** -- *melts* security boundaries normally enforced by the processors hardware.\n\n**Spectre** -- *speculative execution* which leads to information disclosure.\n\nMeltdown and Spectre vulnerabilities affect personal computers, mobile devices, and cloud services.\n\nOperating systems and applications vendors started issuing patches to protect from the chip-level security bug. The coordinated disclosure of the details has been planned for 9th of January, but many details have become known in advance.\n\n# Technical Details\n\nPrograms typically are not permitted to read data from other programs. A malicious program can exploit Meltdown and Spectre to read in the memory space of other running programs. This might include sensitive data.\n\nMeltdown exploits side effects of _out-of-order execution_ on modern processors to read arbitrary kernel memory locations. Out-of-order execution is an performance feature present in a wide range of modern processors. The attack is independent of the operating system, and it does not rely on any software vulnerabilities. Meltdown breaks all security assumptions given by address space isolation as well as para-virtualized environments, and thus every security mechanism building upon this foundation. It affects most Intel and some ARM processors. AMD processors are likely not affected [1].\n\nSpectre attacks involve inducing a victim to _speculatively execute_ operations that would not occur during correct program execution and which leak the victim\u2019s confidential information via a side channel to the adversary. It affects Intel, AMD, and ARM processors [2].\n\nThe vulnerabilities received several CVEs [3]:\n\nSpectre:\n\n* CVE-2017-5753 (bounds check bypass)\n* CVE-2017-5715 (branch target injection)\n\nMeltdown:\n\n* CVE-2017-5754 (rogue data cache load)\n\n# Products Affected\n\nMeltdown affects Intel microarchitectures since 2010 and potentially other CPUs of other vendors [1]. Unlike Meltdown, the Spectre attack works also on  non-Intel processors, including AMD and ARM processors [2].\n\n*    A exhaustive list of Intel affected products can be found in [4].\n*    For ARM processors, impact can be verified in [5].\n*    Unfortunately, AMD did not provide many details at this time [6, 7].  \n\n# Recommendations\n\nFor Microsoft products, in order to check if vulnerable, use PowerShell verification as described here [15].\nFor Linux there is an open source script [19]. Please review and test before running on production systems.\n\nUntil patch for microcode of the processors or other solutions became available, the only option is to update the operating systems and applications as soon as possible. At the moment of writing, this should mitigate some issues (Meltdown), but not others (Spectre).\n\nBelow are references for various vendor-specific advisories:\n\n*    Redhat [9]\n*    Suse [10]\n*    Microsoft [11]\n*    Google/Android [12]\n*    Mozilla [13]\n*    Amazon [14]\n*    Apple [20]\n\nA note for Microsoft products: as incompatibilities might be caused -- depending on the antivirus version used in production -- please check [15] and [16].\n\nFor a more comprehnsive list with official security advisories of affected vendors please check [21].\n\n# References\n\n[1] <https://meltdownattack.com/meltdown.pdf>\n\n[2] <https://spectreattack.com/spectre.pdf>\n\n[3] <https://googleprojectzero.blogspot.be/2018/01/reading-privileged-memory-with-side.html>\n\n[4] <https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr>\n\n[5] <https://developer.arm.com/support/security-update>\n\n[6] <https://arstechnica.com/gadgets/2018/01/meltdown-and-spectre-heres-what-intel-apple-microsoft-others-are-doing-about-it/>\n\n[7] <http://www.amd.com/en/corporate/speculative-execution>\n\n[9] <https://access.redhat.com/security/vulnerabilities/speculativeexecution>\n\n[10] <https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/>\n\n[11] <https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002>\n\n[12] <https://support.google.com/faqs/answer/7622138>\n\n[13] <https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/>\n\n[14] <https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/>\n\n[15] <https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution>\n\n[16] <https://docs.google.com/spreadsheets/u/1/d/184wcDt9I9TUNFFbsAVLpzAtckQxYiuirADzf3cL42FQ/htmlview?sle=true#gid=0>\n\n[17] <https://www.pcworld.com/article/3245790/mobile/spectre-cpu-faq-phones-tablets-ios-android.html>\n\n[18] <https://googleprojectzero.blogspot.co.at/2018/01/reading-privileged-memory-with-side.html>\n\n[19] <https://github.com/speed47/spectre-meltdown-checker>\n\n[20] <https://support.apple.com/en-us/HT208394>\n\n[21] <https://meltdownattack.com>\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>08/01/2018 --- v1.0: Initial publication</em></li><li><em>11/01/2018 --- v1.1: Some corrections and additional sources added</em></li></ul><h2 id=\"summary\">Summary</h2><p>Design flaws in modern computer processors allow programs to steal data processed on the computer. The hardware design deficiencies leaded to the development of two attack scenarios:</p><p><strong>Meltdown</strong> -- <em>melts</em> security boundaries normally enforced by the processors hardware.</p><p><strong>Spectre</strong> -- <em>speculative execution</em> which leads to information disclosure.</p><p>Meltdown and Spectre vulnerabilities affect personal computers, mobile devices, and cloud services.</p><p>Operating systems and applications vendors started issuing patches to protect from the chip-level security bug. The coordinated disclosure of the details has been planned for 9th of January, but many details have become known in advance.</p><h2 id=\"technical-details\">Technical Details</h2><p>Programs typically are not permitted to read data from other programs. A malicious program can exploit Meltdown and Spectre to read in the memory space of other running programs. This might include sensitive data.</p><p>Meltdown exploits side effects of <em>out-of-order execution</em> on modern processors to read arbitrary kernel memory locations. Out-of-order execution is an performance feature present in a wide range of modern processors. The attack is independent of the operating system, and it does not rely on any software vulnerabilities. Meltdown breaks all security assumptions given by address space isolation as well as para-virtualized environments, and thus every security mechanism building upon this foundation. It affects most Intel and some ARM processors. AMD processors are likely not affected [1].</p><p>Spectre attacks involve inducing a victim to <em>speculatively execute</em> operations that would not occur during correct program execution and which leak the victim\u2019s confidential information via a side channel to the adversary. It affects Intel, AMD, and ARM processors [2].</p><p>The vulnerabilities received several CVEs [3]:</p><p>Spectre:</p><ul><li>CVE-2017-5753 (bounds check bypass)</li><li>CVE-2017-5715 (branch target injection)</li></ul><p>Meltdown:</p><ul><li>CVE-2017-5754 (rogue data cache load)</li></ul><h2 id=\"products-affected\">Products Affected</h2><p>Meltdown affects Intel microarchitectures since 2010 and potentially other CPUs of other vendors [1]. Unlike Meltdown, the Spectre attack works also on non-Intel processors, including AMD and ARM processors [2].</p><ul><li>A exhaustive list of Intel affected products can be found in [4].</li><li>For ARM processors, impact can be verified in [5].</li><li>Unfortunately, AMD did not provide many details at this time [6, 7]. </li></ul><h2 id=\"recommendations\">Recommendations</h2><p>For Microsoft products, in order to check if vulnerable, use PowerShell verification as described here [15]. For Linux there is an open source script [19]. Please review and test before running on production systems.</p><p>Until patch for microcode of the processors or other solutions became available, the only option is to update the operating systems and applications as soon as possible. At the moment of writing, this should mitigate some issues (Meltdown), but not others (Spectre).</p><p>Below are references for various vendor-specific advisories:</p><ul><li>Redhat [9]</li><li>Suse [10]</li><li>Microsoft [11]</li><li>Google/Android [12]</li><li>Mozilla [13]</li><li>Amazon [14]</li><li>Apple [20]</li></ul><p>A note for Microsoft products: as incompatibilities might be caused -- depending on the antivirus version used in production -- please check [15] and [16].</p><p>For a more comprehnsive list with official security advisories of affected vendors please check [21].</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://meltdownattack.com/meltdown.pdf\">https://meltdownattack.com/meltdown.pdf</a></p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://spectreattack.com/spectre.pdf\">https://spectreattack.com/spectre.pdf</a></p><p>[3] <a rel=\"noopener\" target=\"_blank\" href=\"https://googleprojectzero.blogspot.be/2018/01/reading-privileged-memory-with-side.html\">https://googleprojectzero.blogspot.be/2018/01/reading-privileged-memory-with-side.html</a></p><p>[4] <a rel=\"noopener\" target=\"_blank\" href=\"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr\">https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&amp;languageid=en-fr</a></p><p>[5] <a rel=\"noopener\" target=\"_blank\" href=\"https://developer.arm.com/support/security-update\">https://developer.arm.com/support/security-update</a></p><p>[6] <a rel=\"noopener\" target=\"_blank\" href=\"https://arstechnica.com/gadgets/2018/01/meltdown-and-spectre-heres-what-intel-apple-microsoft-others-are-doing-about-it/\">https://arstechnica.com/gadgets/2018/01/meltdown-and-spectre-heres-what-intel-apple-microsoft-others-are-doing-about-it/</a></p><p>[7] <a rel=\"noopener\" target=\"_blank\" href=\"http://www.amd.com/en/corporate/speculative-execution\">http://www.amd.com/en/corporate/speculative-execution</a></p><p>[9] <a rel=\"noopener\" target=\"_blank\" href=\"https://access.redhat.com/security/vulnerabilities/speculativeexecution\">https://access.redhat.com/security/vulnerabilities/speculativeexecution</a></p><p>[10] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/\">https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/</a></p><p>[11] <a rel=\"noopener\" target=\"_blank\" href=\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002\">https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002</a></p><p>[12] <a rel=\"noopener\" target=\"_blank\" href=\"https://support.google.com/faqs/answer/7622138\">https://support.google.com/faqs/answer/7622138</a></p><p>[13] <a rel=\"noopener\" target=\"_blank\" href=\"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/\">https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/</a></p><p>[14] <a rel=\"noopener\" target=\"_blank\" href=\"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/\">https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/</a></p><p>[15] <a rel=\"noopener\" target=\"_blank\" href=\"https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution\">https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-speculative-execution</a></p><p>[16] <a rel=\"noopener\" target=\"_blank\" href=\"https://docs.google.com/spreadsheets/u/1/d/184wcDt9I9TUNFFbsAVLpzAtckQxYiuirADzf3cL42FQ/htmlview?sle=true#gid=0\">https://docs.google.com/spreadsheets/u/1/d/184wcDt9I9TUNFFbsAVLpzAtckQxYiuirADzf3cL42FQ/htmlview?sle=true#gid=0</a></p><p>[17] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.pcworld.com/article/3245790/mobile/spectre-cpu-faq-phones-tablets-ios-android.html\">https://www.pcworld.com/article/3245790/mobile/spectre-cpu-faq-phones-tablets-ios-android.html</a></p><p>[18] <a rel=\"noopener\" target=\"_blank\" href=\"https://googleprojectzero.blogspot.co.at/2018/01/reading-privileged-memory-with-side.html\">https://googleprojectzero.blogspot.co.at/2018/01/reading-privileged-memory-with-side.html</a></p><p>[19] <a rel=\"noopener\" target=\"_blank\" href=\"https://github.com/speed47/spectre-meltdown-checker\">https://github.com/speed47/spectre-meltdown-checker</a></p><p>[20] <a rel=\"noopener\" target=\"_blank\" href=\"https://support.apple.com/en-us/HT208394\">https://support.apple.com/en-us/HT208394</a></p><p>[21] <a rel=\"noopener\" target=\"_blank\" href=\"https://meltdownattack.com\">https://meltdownattack.com</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}