Security Advisories /
CPU Vulnerabilities “Meltdown” and “Spectre”
2018-01 ATS Security Advisory
CPU Vulnerabilities “Meltdown” and “Spectre”
Summary
A new class of vulnerability was recently discovered and reported by security researchers. Two specific examples of this vulnerability, called “Meltdown” and “Spectre” can allow an attackerto read any memory content on a computer. This memory may contain information intended tobe kept secret, such as passwords and other sensitive data. In cloud environments, wherecomputing resources are shared, this vulnerability can allow an attacker to read memory onsystems that belong to other tenants. Since this vulnerability affects physical hardware, itcannot be patched directly; it must be mitigated through software. Microsoft, Apple, and theLinux kernel developers have released patches to mitigate this class of vulnerability inWindows, MacOS and Linux, respectively. The available exploits for this vulnerability are onlyconsistently successful against Intel processors.
ATS is currently working to mitigate this vulnerability in all managed systems. Customers hostedin the Azure Cloud are already protected. Operating system vendor patches are being reviewedand deployed to other managed systems.
Details
Modern computer systems isolate memory between various user processes and kernel(operating system) processes. This is an important security feature that prevents a process from reading or writing arbitrary information from other processes or from the operating system itself. For example, a photo editing application should not be allowed to read the system memory where a password manager application stores secret passwords. Or a web server service should not be allowed to read login credentials from kernel (operating system) memory. This feature, implemented by operating systems and supported by specific processor features, strengthens the security of computer systems.
Modern processors use clever techniques to improve performance. One technique, known as “out-of-order execution” allows a processor to look ahead and process instructions that would be delayed if processed linearly. For instance, while a process is waiting for data to be read from a hard drive, it will look ahead and process instructions that are not dependent on that data. Another technique, known as “branch prediction” allows the processor to guess which path a process will take, and then compute the instructions in the guessed path. If the guessed path is wrong, then those instructions are rolled-back with no harm to the integrity of the process.
Researchers were able to use the branch prediction and out-of-order execution techniques, along with a known side-channel attack called “FLUSH+RELOAD” to allow a user process to read kernel memory. First, the attacking program requests to read information from kernel memory. The branch prediction and out-of-order execution techniques allow this information to be read. This information is never shared directly with the attacker program, because of memory isolation. This information is, however, stored in the processor cache. This processor cache, too, is not directly readable by the attacking process. The previously developed “FLUSH+RELOAD” attack allows the attacker process to indirectly deduce the contents of the cache. Ultimately, this allows the attacking process to read kernel memory.
Risk Mitigation Steps Taken by ATS on Behalf of Clients
Spectre and Meltdown represent a new class of vulnerabilities leveraging speculative execution. These vulnerabilities affect a wide range of physical processors (including Intel, AMD, ARM) and virtual machines (JavaScript JIT compilers). Some patches for these vulnerabilities have caused degraded processing performance. In short, mitigation techniques for these vulnerabilities are complex and ongoing.
Microsoft Azure infrastructure VM instances were updated with mitigations before public disclosure of the vulnerabilities. [0]
Managed Microsoft Windows systems have been updated to protect the operating system, as well as the Edge Browser. In some cases, these patches require firmware updates that are ongoing.[1]
Managed Apple hardware including supported versions iOS and MacOS have been updated with Apple-provided mitigations. [2]
Managed Ubuntu Linux systems are updated to implement kernel mitigations. [3]
What Can You Do?
This is a serious issue that affects almost all servers, workstations and laptops. Some tablets and phones may be affected, as well. ATS will work to mitigate these vulnerabilities to all affected managed systems. It is important that all systems are updated, including unmanaged and personal devices. Please apply patches to any unmanaged and personal computers.
Feel free to contact [email protected]with any questions or concerns. As always, we value hearing from our clients about general and specific security concerns so that we can provide the best possible services.
[0] https://azure.microsoft.com/en-us/blog/securing-azure-customers-from-cpu-vulnerability/
[1] https://support.microsoft.com/en-us/help/4073757/protect-your-windows-devices-against-spectre-meltdown
[2] https://support.apple.com/en-us/HT208394
[3] https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown
Working with ATS is a breath of fresh air. ATS takes our information security concerns seriously and advises us how to avoid potential pitfalls with both hardware and software. We are beyond thrilled with ATS and only wish we had selected them a year earlier.
Joseph A. Appelbaum
President & CEO, Potomac Companies, Inc.
ATS has been our trusted partner in recent upgrades we have made to our IT infrastructure and cyber security. Their account management, project management, and technical teams have all provided top-notch service, guiding us to make informed decisions, managing timelines for multiple projects, and most of all, listening to our needs and making recommendations based on our unique work environment. During the transitions, they have kept us operating smoothly and provided quick and helpful support through their Help Desk.
Amy Gavin
Nutrition.org
I just wanted to take a moment to reach out and thank you for the excellent service you and your team have provided with the hosted SIEM solution. AlienVault is great, but the real value comes from your partnership. The appliance would not do nearly as much for us without your monitoring and consulting services. You have always been on top of things and there for us whenever there is an incident. I feel confident in that our network is secure and I am able to report that our board and clients with full assurance.
Chris Hansford
EducationWeek.org