The Complete List Of CPUs Affected By Meltdown + Spectre

Discussion in 'Serious Discussion' started by parrish, Apr 16, 2018.

  1. parrish

    parrish MDL Novice

    Oct 16, 2016
    The Complete List Of CPUs Affected By Meltdown + Spectre

    The speculative execution CPU bug that literally kneecapped Intel, also affects many AMD and ARM processors.

    This means BILLIONS of CPUs around the world, including those powering smartphones, are affected by Meltdown and/or Spectre.

    The Meltdown and Spectre CPU flaws that the Google Project Zero team discovered are arguably the worst we have ever known. These vulnerabilities were built into BILLIONS of CPUs that we have been using for the last decade or so.

    Not just Intel CPUs, but also CPUs made by AMD, Apple and ARM. Even those that power our smartphones and other smart devices!

    Let’s take a look at what we know so far about Meltdown and Spectre, how they affect you, and what we can do about them.

    This story is still developing. We will update the article as and when new details emerge. Be sure to check back and refresh the page for the latest information!

    Everything On The Meltdown + Spectre CPU Flaws!

    The Meltdown + Spectre Vulnerabilities

    The Project Zero team identified these vulnerabilities in 2017, reporting it to Intel, AMD and ARM on 1 June 2017.

    These vulnerabilities take advantage of the Speculative Execution and Branch Prediction features of the modern processor, that have been used for many years to improve performance.

    Speculative Execution lets the CPU predict and pre-execute the next instruction, allowing it to “instantly” deliver the results if it’s correct.
    Branch Prediction helps the CPU predict future execution paths that should be speculatively-executed for better performance.

    There are THREE (3) variants of the speculative execution CPU bug :
    Variant 1 : Bounds Check Bypass (CVE-2017-5753)
    Variant 2 : Branch Target Injection (CVE-2017-5715)
    Variant 3 : Rogue Data Cache Load (CVE-2017-5754)
    The Spectre attack (whitepaper) exploits variants 1 and 2.
    The Meltdown attack (whitepaper) exploits variant 3.

    There is a Variant 3a, which appears to affect only certain ARM processors.

    What’s The Difference Between Meltdown & Spectre?

    Spectre tricks the CPU branch predictor into mis-predicting the wrong path, thereby speculatively executing code that would not otherwise be executed.

    Meltdown takes advantage of the out-of-order execution capability of modern processors, tricking them into executing malicious code that would normally not be allowed.

    The Spectre name is based on both the root cause – speculative execution, and the fact that it is not easy to fix, and will haunt us for a long time like a spectre (ghost).

    The Meltdown name was chosen because the vulnerability “basically melts security boundaries which are normally enforced by the hardware“.

    How Bad Are Meltdown & Spectre?

    The Spectre exploits let an attacker access and copy information from the memory space used by other applications.

    The Meltdown exploit lets an attacker copy the entire physical memory of the computer.

    Unless patched, the affected processors are vulnerable to malware and cyberattacks that exploits this CPU bug to steal critical information from running apps (like login and credit card information, emails, photos, documents, etc.)

    While the Meltdown exploit can be “fixed”, it is likely that the Spectre exploit cannot be fixed, only mitigated, without a redesign of the processors.

    That means we will have to live with the risks of a Spectre attack for many more years to come.

    How Many Processors Are Affected? Updated!

    For the complete list of affected AMD, Apple, ARM and Intel processors, please see this separate article – The Complete List Of CPUs Vulnerable To Meltdown / Spectre via the link below...

    Company Spectre 1 Spectre 2 Meltdown
    AMD 295 Server CPUs
    42 Workstation CPUs
    396 Desktop CPUs
    208 Mobile CPUs 295 Server CPUs
    42 Workstation CPUs
    396 Desktop CPUs
    208 Mobile CPUs None
    Apple 13 Mobile SoCs 13 Mobile SoCs 13 Mobile SoCs
    ARM 10 Mobile CPUs
    3 Server SoCs 10 Mobile CPUs
    3 Server SoCs 4 Mobile CPUs
    3 Server SoCs
    Intel 732 Server / Workstation CPUs
    443 Desktop CPUs
    583 Mobile CPUs
    51 Mobile SoCs 732 Server / Workstation CPUs
    443 Desktop CPUs
    583 Mobile CPUs
    51 Mobile SoCs 732 Server / Workstation CPUs
    443 Desktop CPUs
    583 Mobile CPUs
    51 Mobile SoCs

    2786 CPUs 2786 CPUs 1839 CPUs

    For the complete list of affected AMD, Apple, ARM and Intel processors, please see this separate article – The Complete List Of CPUs Vulnerable To Meltdown / Spectre

    Intel Detection Tool?

    The Intel-SA-00086 Detection Tool does NOT detect the processor’s susceptibility to these vulnerabilities. It only checks for different vulnerabilities affecting the Intel Management Engine.

    Our reader Arthur shared that the Gibson Research Corporation has an aptly-named utility called InSpectre.

    It checks for Meltdown and Spectre hardware and software vulnerabilities in a Windows system.

    It will help you check if your system is getting patched properly against these vulnerabilities.

    What Is Being Done??? Updated!

    Note : The terms “mitigate” and “mitigation” mean the possibility of a successfully attacked are reduced, not eliminated.

    Intel has started issuing software and firmware updates for the processors introduced in the last 5 years. By the middle of January 2018, Intel expects to have issued updates for more than 90% of those CPUs.

    However, that does not address the other Intel processors sold between 2010 and 2012.

    Microsoft and Linux have started to roll our the KPTI (Kernel Page Table Isolation) patch, also known as the KAISER (Kernel Address Isolation to have Side-channels Efficiently Removed) patch.

    The KPTI or KAISER patch, however, will only protect against the Meltdown exploit. It has no effect on a Spectre attack.

    Microsoft Edge and Internet Explorer 11 received the KB4056890 security update on 3 January 2018, to prevent a Meltdown attack.

    Firefox 57 includes changes to mitigate against both attacks.
    Google Chrome 64 will be released on 23 January 2018, with mitigations against Meltdown and Spectre attacks.

    For Mac systems, Apple introduced mitigations against Spectre in macOS 10.13.2 (released on 8 January 2018), with more fixes coming in macOS 10.13.3.

    For iOS devices, Apple introduced mitigations against Meltdown in iOS 11.2 and tvOS 11.2.

    On 8 January 2018, Apple released iOS 11.2.2, which mitigates the risk of the two Spectre exploits in Safari and WebKit, for iPhone 5s, iPad Air, and iPod touch 6th generation or later.

    ARM has made available the KPTI / KAISER kernel patches for Linux, while Google will provide them for Android.

    Google patched Android against both exploits with the December 2017 and January 2018 patches.

    Google shared details of their Return Rrampoline (Retpoline) binary modification technique that can be used to protect against Spectre attacks.

    It is a software construct that ensures that any associated speculative execution will “bounce” (as if on a trampoline) endlessly.

    NVIDIA issued six driver and security updates for affected devices and software between 3-9 January 2018.

    On 11 January 2018, AMD announced that the “majority of AMD systems” have received the mitigation patches against Spectre 1, albeit some older AMD systems got bricked by bad patches.

    They also announced that they will make “optional” microcode updates available for Ryzen and EPYC processors by the same week.

    In the same 11 January 2018 disclosure, AMD also shared that Linux vendors have started to roll out OS patches for both Spectre exploits, and they’re working on the “return trampoline (Retpoline)” software mitigations as well.

    On 23 January 2018, Apple released Meltdown patches for macOS Sierra and OS X El Capitan, but not macOS High Sierra.

    On 23 January 2018, Microsoft finally revealed their Spectre and Meltdown patch schedule.

    On 24 January 2018, AMD revealed their 11 software mitigations for both Spectre exploits.

    The 24 January 2018 AMD whitepaper also revealed that the AMD K10 and K8 processors are vulnerable as well, adding an additional 663 CPU models to the list of vulnerable processors.

    On 2 February 2018, Microsoft released KB4078130 to disable the Spectre 2 patches that were causing many Intel systems to randomly and spontaneously reboot.

    On 8 February 2018, an Intel microcode update schedule revealed that their Penryn-based processors are also vulnerable, adding an additional 314 CPU models to the list of vulnerable processors.

    On 14 February 2018, Intel revealed an expanded Bug Bounty Program, offering up to $250,000 in bounty awards.

    Some AMD PCs Got Bricked

    In the rush to mitigate against Meltdown and Spectre, Microsoft released Windows 10 patches that bricked some AMD PCs.

    They blamed the incorrect / incomplete documentation provided by AMD.

    You can read more about this issue @ These Windows 10 Updates Are Bricking AMD PCs!

    Buggy Intel Spectre 2 Patches Updated!

    Intel’s rush to patch Meltdown and Spectre resulted in buggy microcode patches, causing several generations of their CPUs to randomly and spontaneously reboot.

    So far, over 800 Intel CPU models have been identified to be affected by these spontaneous reboot issues.

    If you have one of the affected CPUs, please hold off BIOS / firmware updates!

    Intel has identified the cause as the Spectre 2 patches in their microcode updates for some of these processors.

    They’re still investigating the cause of the other affected CPU models.

    Fortunately for Windows users, Microsoft issued the KB4078130 emergency update to stop the reboots while Intel worked to fix the issue.

    You can read more about this issue @ The Intel Spectre Reboot Issue, and the Microsoft solution @ KB4078130 : Emergency Windows Update To Disable Intel Spectre Patches!

    What Should You Do? Updated!

    First and foremost – DO NOT PANIC. There is no known threat or attack using these exploits.

    Although we listed a number of important patches below, the buggy updates are worse than the potential threat they try to fix.

    So we advise HOLDING OFF these patches, and wait for properly-tested versions a few weeks down the line.

    If you are using Windows, make sure you install the latest Microsoft Spectre and Meltdown updates.

    If you are using a Mac system, get the latest Apple Spectre and Meltdown patches.

    If you are using an iOS device, get updated to iOS 11.2 or tvOS 11.2.

    If you are using Firefox, update to the latest Firefox 57.

    If you are using Google Chrome, make sure you watch out for Chrome 64, which will be released on 23 January.

    Download and install the latest software firmware updates from your PC, laptop, motherboard brands. In particular, install the latest driver for the Intel Management Engine (Intel ME), the Intel Trusted Execution Engine (Intel TXE), and the Intel Server Platform Services (SPS)

    If you are running an ARM processor on Linux, grab the kernel patches.

    IBM POWER system users can download and install these firmware updates.
    Users of affected NVIDIA systems can download and install these driver
    and firmware updates.

    If you are using an Intel system, hold off updating your firmware, unless you have already verified that your CPU is not affected by the buggy Intel patches, or Intel has already issued corrected patches.

    The Performance Impact Of The Mitigation Patches

    Many benchmarks have been released, showing performance impacts of between 5% to 30%, depending on the type of benchmark and workload.

    Microsoft has called those benchmark results into question, stating that they did not cover both operating system and silicon microcode patches.

    They released an initial report on their findings, which we have summarised in our article – Pre-2016 Intel CPUs Hit Worst By Meltdown + Spectre Fix.
    Meltdown + Spectre Reading Suggestions

    Everything On The Meltdown + Spectre CPU Flaws!
    The Complete List Of CPUs Vulnerable To Meltdown / Spectre
    The Microsoft Spectre + Meltdown Patch Schedule
    The Intel Spectre Reboot Issue – Everything You Need To Know!
    Intel Penryn CPUs Also Vulnerable To Meltdown + Spectre
    The Complete AMD Spectre Mitigation Strategy Guide
    The Apple Spectre + Meltdown Patches Detailed
    These Windows 10 Updates Are Bricking AMD PCs!
    Pre-2016 Intel CPUs Hit Worst By Meltdown + Spectre Fix
    Yes, AMD CPUs Are Also Vulnerable To Spectre 2 Exploit
    AMD K10 And K8 Processors Also Vulnerable To Spectre
    KB3078130 : Emergency Windows Update To Disable Intel Spectre Patches!



    Tech ARP

    BIOS Guide


    Complete List Of CPUs Vulnerable To Meltdown / Spectre Rev. 8.0
    Posted by Dr. Adrian Wong
    Date: March 07, 2018
    in: Guides

    (11) Comments
    Intel Desktop CPUs Affected By Meltdown + Spectre
    Intel Desktop CPUs Vulnerable To Meltdown + Spectre

    Affected Variants : These Intel CPUs are affected by all three variants of the speculative execution CPU bug. They are vulnerable to the Meltdown and both Spectre exploits.
    Intel Coffee Lake-S (2017)

    Intel Core i7-8700K
    Intel Core i7-8700
    Intel Core i5-8600K
    Intel Core i5-8400
    Intel Core i3-8350K
    Intel Core i3-8100

    Intel Gemini Lake (2017)

    Intel Pentium Silver J5005
    Intel Celeron J4105
    Intel Celeron J4005

    Intel Denverton (2017)

    Intel Celeron C3958
    Intel Celeron C3955
    Intel Celeron C3950
    Intel Celeron C3858
    Intel Celeron C3850
    Intel Celeron C3830
    Intel Celeron C3808
    Intel Celeron C3758
    Intel Celeron C3750
    Intel Celeron C3708
    Intel Celeron C3558
    Intel Celeron C3538
    Intel Celeron C3508
    Intel Celeron C3338
    Intel Celeron C3308

    Intel Kaby Lake-X (2017)

    Intel Core i7-7740X
    Intel Core i5-7640X

    Intel Kaby Lake-S (2017)

    Intel Core i7-7700K
    Intel Core i7-7700
    Intel Core i7-7700T
    Intel Core i5-7600K
    Intel Core i5-7600
    Intel Core i5-7600T
    Intel Core i5-7500
    Intel Core i5-7500T
    Intel Core i5-7400
    Intel Core i5-7400T
    Intel Core i3-7350K
    Intel Core i3-7320
    Intel Core i3-7300
    Intel Core i3-7300T
    Intel Core i3-7101T
    Intel Core i3-7101TE
    Intel Core i3-7100
    Intel Core i3-7100T
    Intel Pentium G4620
    Intel Pentium G4600
    Intel Pentium G4600T
    Intel Pentium G4560
    Intel Pentium G4560T
    Intel Celeron G3950
    Intel Celeron G3930
    Intel Celeron G3930T
    Intel Celeron G3930E
    Intel Celeron G3930TE

    Intel Skylake-X (2017)

    Intel Core i9-7980XE
    Intel Core i9-7960X
    Intel Core i9-7940X
    Intel Core i9-7920X
    Intel Core i9-7900X
    Intel Core i7-7820X
    Intel Core i7-7800X

    Intel Apollo Lake (2016)

    Intel Pentium J4205
    Intel Pentium J3455
    Intel Pentium J3355
    Intel Celeron J3455
    Intel Celeron J3355
    Intel Atom x5-E3950
    Intel Atom x5-E3940
    Intel Atom x5-E3930

    Intel Skylake-H (2016)

    Intel Core i7-6785R
    Intel Core i5-6685R
    Intel Core i5-6585R

    Intel Braswell (2016)

    Intel Pentium J3710
    Intel Celeron J3160
    Intel Celeron J3060
    Intel Atom x5-E8000

    Intel Broadwell-E (2016)

    Intel Core i7-6950X
    Intel Core i7-6900K
    Intel Core i7-6850X
    Intel Core i7-6800X

    Intel Skylake-S (2015)

    Intel Core i7-6700K
    Intel Core i7-6700
    Intel Core i7-6700T
    Intel Core i7-6700TE
    Intel Core i5-6600K
    Intel Core i5-6600
    Intel Core i5-6600T
    Intel Core i5-6500
    Intel Core i5-6500T
    Intel Core i5-6500TE
    Intel Core i5-6402P
    Intel Core i5-6400
    Intel Core i5-6400T
    Intel Core i3-6320
    Intel Core i3-6300
    Intel Core i3-6300T
    Intel Core i3-6100
    Intel Core i3-6100T
    Intel Core i3-6100TE
    Intel Core i3-6098P
    Intel Pentium G4520
    Intel Pentium G4500
    Intel Pentium G4500T
    Intel Pentium G4400
    Intel Pentium G4400T
    Intel Pentium G4400TE
    Intel Celeron G3920
    Intel Celeron G3902E
    Intel Celeron G3900
    Intel Celeron G3900T
    Intel Celeron G3900E
    Intel Celeron G3900TE

    Intel Broadwell-H (2015)

    Intel Core i7-5775C
    Intel Core i7-5775R
    Intel Core i5-5675R
    Intel Core i5-5675C
    Intel Core i5-5575R

    Intel Haswell-E (2014)

    Intel Core i7-5960X
    Intel Core i7-5930K
    Intel Core i7-5820K

    Intel Haswell-H (2013)

    Intel Core i7-4770R
    Intel Core i5-4670R
    Intel Core i5-4570R

    Intel Haswell-DT (2013)

    Intel Core i7-4790K
    Intel Core i7-4790
    Intel Core i7-4790S
    Intel Core i7-4790T
    Intel Core i7-4785T
    Intel Core i7-4771
    Intel Core i7-4770K
    Intel Core i7-4770
    Intel Core i7-4770S
    Intel Core i7-4770T
    Intel Core i7-4770TE
    Intel Core i7-4765T
    Intel Core i5-4690K
    Intel Core i5-4690
    Intel Core i5-4690S
    Intel Core i5-4690T
    Intel Core i5-4670K
    Intel Core i5-4670
    Intel Core i5-4670S
    Intel Core i5-4670T
    Intel Core i5-4590
    Intel Core i5-4590S
    Intel Core i5-4590T
    Intel Core i5-4570
    Intel Core i5-4570S
    Intel Core i5-4570T
    Intel Core i5-4570TE
    Intel Core i5-4460
    Intel Core i5-4460S
    Intel Core i5-4460T
    Intel Core i5-4440
    Intel Core i5-4440S
    Intel Core i5-4430
    Intel Core i5-4430S
    Intel Core i3-4370
    Intel Core i3-4370T
    Intel Core i3-4360
    Intel Core i3-4360T
    Intel Core i3-4350
    Intel Core i3-4350T
    Intel Core i3-4340
    Intel Core i3-4340TE
    Intel Core i3-4330
    Intel Core i3-4330T
    Intel Core i3-4330TE
    Intel Core i3-4170
    Intel Core i3-4170T
    Intel Core i3-4160
    Intel Core i3-4160T
    Intel Core i3-4150
    Intel Core i3-4150T
    Intel Core i3-4130
    Intel Core i3-4130T
    Intel Pentium G3470
    Intel Pentium G3460
    Intel Pentium G3460T
    Intel Pentium G3450
    Intel Pentium G3450T
    Intel Pentium G3440
    Intel Pentium G3440T
    Intel Pentium G3430
    Intel Pentium G3420
    Intel Pentium G3420T
    Intel Pentium G3320TE
    Intel Pentium G3260
    Intel Pentium G3260T
    Intel Pentium G3258
    Intel Pentium G3250
    Intel Pentium G3250T
    Intel Pentium G3240
    Intel Pentium G3240T
    Intel Pentium G3220
    Intel Pentium G3220T
    Intel Celeron G1850
    Intel Celeron G1840
    Intel Celeron G1840T
    Intel Celeron G1830
    Intel Celeron G1820
    Intel Celeron G1820T
    Intel Celeron G1820TE

    Intel Bay Trail-D (2013)

    Intel Celeron J1900
    Intel Celeron J1850
    Intel Celeron J1800
    Intel Celeron J1750

    Intel Bay Trail-I (2013)

    Intel Atom E3845
    Intel Atom E3827
    Intel Atom E3826
    Intel Atom E3825
    Intel Atom E3815
    Intel Atom E3805

    Intel Ivy Bridge-E (2012)

    Intel Core i7-4960X
    Intel Core i7-4960K
    Intel Core i7-4820K

    Intel Ivy Bridge (2012)

    Intel Core i7-3770K
    Intel Core i7-3770
    Intel Core i7-3770S
    Intel Core i7-3770T
    Intel Core i5-3570K
    Intel Core i5-3570
    Intel Core i5-3570S
    Intel Core i5-3570T
    Intel Core i5-3550
    Intel Core i5-3550S
    Intel Core i5-3475S
    Intel Core i5-3470
    Intel Core i5-3470S
    Intel Core i5-3470T
    Intel Core i5-3450
    Intel Core i5-3450S
    Intel Core i5-3350P
    Intel Core i5-3440
    Intel Core i5-3440S
    Intel Core i5-3335S
    Intel Core i5-3330
    Intel Core i5-3330S
    Intel Core i3-3250
    Intel Core i3-3250T
    Intel Core i3-3245
    Intel Core i3-3240
    Intel Core i3-3240T
    Intel Core i3-3225
    Intel Core i3-3220
    Intel Core i3-3220T
    Intel Core i3-3210
    Intel Pentium G2140
    Intel Pentium G2130
    Intel Pentium G2120
    Intel Pentium G2120T
    Intel Pentium G2100T
    Intel Pentium G2030
    Intel Pentium G2030T
    Intel Pentium G2020
    Intel Pentium G2020T
    Intel Pentium G2010
    Intel Celeron G1630
    Intel Celeron G1620
    Intel Celeron G1620T
    Intel Celeron G1610
    Intel Celeron G1610T

    Intel Sandy Bridge-E (2011)

    Intel Core i7-3970X
    Intel Core i7-3960K
    Intel Core i7-3930K
    Intel Core i7-3820

    Intel Sandy Bridge (2011)

    Intel Core i7-2700K
    Intel Core i7-2600K
    Intel Core i7-2600
    Intel Core i7-2600S
    Intel Core i5-2550K
    Intel Core i5-2500K
    Intel Core i5-2500
    Intel Core i5-2500S
    Intel Core i5-2500T
    Intel Core i5-2450P
    Intel Core i5-2405S
    Intel Core i5-2400
    Intel Core i5-2400S
    Intel Core i5-2390T
    Intel Core i5-2370P
    Intel Core i5-2320
    Intel Core i5-2310
    Intel Core i5-2300
    Intel Core i3-2130
    Intel Core i3-2125
    Intel Core i3-2120
    Intel Core i3-2120T
    Intel Core i3-2105
    Intel Core i3-2102
    Intel Core i3-2100
    Intel Core i3-2100T
    Intel Pentium G870
    Intel Pentium G860
    Intel Pentium G860T
    Intel Pentium G850
    Intel Pentium G840
    Intel Pentium G645
    Intel Pentium G645T
    Intel Pentium G640
    Intel Pentium G640T
    Intel Pentium G632
    Intel Pentium G630
    Intel Pentium G630T
    Intel Pentium G622
    Intel Pentium G620
    Intel Pentium G620T
    Intel Celeron G555
    Intel Celeron G550
    Intel Celeron G550T
    Intel Celeron G540
    Intel Celeron G540T
    Intel Celeron G530
    Intel Celeron G530T
    Intel Celeron G470
    Intel Celeron G465
    Intel Celeron G460
    Intel Celeron G440

    Intel Gulftown (2010)

    Intel Core i7-990X
    Intel Core i7-980X
    Intel Core i7-980
    Intel Core i7-970

    Intel Clarksdale (2010)

    Intel Core i5-680
    Intel Core i5-670
    Intel Core i5-661
    Intel Core i5-660
    Intel Core i5-655K
    Intel Core i5-650
    Intel Core i3-560
    Intel Core i3-550
    Intel Core i3-540
    Intel Core i3-530
    Intel Pentium G6960
    Intel Pentium G6951
    Intel Pentium G6950
    Intel Celeron G1101

    Intel Lynnfield (2009)

    Intel Core i7-880
    Intel Core i7-875K
    Intel Core i7-870
    Intel Core i7-870S
    Intel Core i7-860
    Intel Core i7-860S
    Intel Core i5-760
    Intel Core i5-750
    Intel Core i5-750S

    Intel Bloomfield (2008)

    Intel Core i7-975 Extreme Edition
    Intel Core i7-965 Extreme Edition
    Intel Core i7-960
    Intel Core i7-950
    Intel Core i7-940
    Intel Core i7-930
    Intel Core i7-920

    Intel Yorkfield-6M (2008-2010)

    Intel Core 2 Quad Q9705
    Intel Core 2 Quad Q9700
    Intel Core 2 Quad Q9505S
    Intel Core 2 Quad Q9505
    Intel Core 2 Quad Q9500
    Intel Core 2 Quad Q9400S
    Intel Core 2 Quad Q9400
    Intel Core 2 Quad Q9300
    Intel Core 2 Quad Q8400S
    Intel Core 2 Quad Q8400
    Intel Core 2 Quad Q8300
    Intel Core 2 Quad Q8200S
    Intel Core 2 Quad Q8200

    Intel Yorkfield (2008-2009)

    Intel Core 2 Quad Q9650
    Intel Core 2 Quad Q9550S
    Intel Core 2 Quad Q9550
    Intel Core 2 Quad Q9450S
    Intel Core 2 Quad Q9450

    Intel Wolfdale (2008-2009)

    Intel Core 2 Duo E8700
    Intel Core 2 Duo E8600
    Intel Core 2 Duo E8500
    Intel Core 2 Duo E8400
    Intel Core 2 Duo E8300
    Intel Core 2 Duo E8290
    Intel Core 2 Duo E8200
    Intel Core 2 Duo E8190

    Intel Wolfdale-3M (2008-2010)

    Intel Core 2 Duo E7600
    Intel Core 2 Duo E7500
    Intel Core 2 Duo E7400
    Intel Core 2 Duo E7300
    Intel Core 2 Duo E7200
    Intel Pentium E6800
    Intel Pentium E6700
    Intel Pentium E6600
    Intel Pentium E6500K
    Intel Pentium E6500
    Intel Pentium E6300
    Intel Pentium E5800
    Intel Pentium E5700
    Intel Pentium E5500
    Intel Pentium E5400
    Intel Pentium E5300
    Intel Pentium Dual-Core E5300
    Intel Pentium E5200
    Intel Pentium Dual-Core E5200
    Intel Pentium Dual-Core E2210
    Intel Celeron E3500
    Intel Celeron E3400
    Intel Celeron E3300
    Intel Celeron E3200

    Intel Allendale (2008-2009)

    Intel Celeron E1600
    Intel Celeron E1500
    Intel Celeron E1400
    Intel Celeron E1200

    Intel Yorkfield-XE (2007-2008)

    Intel Core 2 Extreme QX9775
    Intel Core 2 Extreme QX9770
    Intel Core 2 Extreme QX9650

    Intel Conroe-L (2007-2008)

    Intel Celeron 450
    Intel Celeron 445
    Intel Celeron 430
    Intel Celeron 420
    Intel Celeron 220

    Intel Kentsfield (2007)

    Intel Core 2 Quad Q6700
    Intel Core 2 Quad Q6600
    Intel Core 2 Quad Q6400

    Intel Conroe-CL (2007)

    Intel Core 2 Duo E6405
    Intel Core 2 Duo E6305
    Intel Celeron 445

    Intel Conroe (2006-2008)

    Intel Core 2 Duo E6850
    Intel Core 2 Duo E6750
    Intel Core 2 Duo E6700
    Intel Core 2 Duo E6600
    Intel Core 2 Duo E6550
    Intel Core 2 Duo E6540
    Intel Core 2 Duo E6420
    Intel Core 2 Duo E6400
    Intel Core 2 Duo E6320
    Intel Core 2 Duo E6300
    Intel Core 2 Duo E4700
    Intel Core 2 Duo E4600
    Intel Core 2 Duo E4500
    Intel Core 2 Duo E4400
    Intel Core 2 Duo E4300
    Intel Pentium Dual-Core E2220
    Intel Pentium Dual-Core E2200
    Intel Pentium Dual-Core E2180
    Intel Pentium Dual-Core E2160
    Intel Pentium Dual-Core E2140

    Intel Kentsfield-XE (2006-2007)

    Intel Core 2 Extreme QX6850
    Intel Core 2 Extreme QX6800
    Intel Core 2 Extreme QX6700

    Continue: Intel Mobile CPUs Affected By Meltdown + Spectre

    1. The Complete List Of CPUs Affected By Meltdown + Spectre
    2. AMD Workstation, Desktop & Mobile CPUs Vulnerable To Spectre
    3. AMD Mobile CPUs Vulnerable To Spectre
    4. Apple, ARM & Intel CPUs Affected By Meltdown & Spectre
    5. Intel Server / Workstation CPUs Vulnerable To Meltdown + Spectre
    6. Intel Desktop CPUs Affected By Meltdown + Spectre
    7. Intel Mobile CPUs Affected By Meltdown + Spectre
    8. VIA Desktop + Mobile CPUs Vulnerable To Meltdown + Spectre

    Everything On The Meltdown + Spectre CPU Flaws! Rev. 3.0
    Everything On The Meltdown + Spectre CPU Flaws! Rev. 3.0

    f February 2018

    In "Articles"
    These Windows 10 Updates Are Bricking AMD PCs! Rev. 4.0
    These Windows 10 Updates Are Bricking AMD PCs! Rev. 4.0

    f January 2018

    In "Articles"
    Pre-2016 Intel CPUs Hit Worst By Meltdown + Spectre Fix
    Pre-2016 Intel CPUs Hit Worst By Meltdown + Spectre Fix

    Tags:AMDappleARMBugBug fixComputer securityCPUCybersecurityData SecurityDesktop CPUIntelMediaTekMeltdownMobile CPUMobile SecurityProcessorQualcommSamsungSecurity bugServer CPUSmartphoneSpectre

    Previous : New Samsung Galaxy S9 Bixby Features Demonstrated!
    Next : Acer Aspire S 24 AIO + Three Acer Monitors Revealed!
    About The Author
    Dr. Adrian Wong

    Related posts via the link below...

    How To Reindex Your Website Using Google Search Console
    How To Reindex Your Website Using Google Search Console
    March 13, 2018
    How To Detect + Fix Sitemap Problems In Google Search Console
    How To Detect + Fix Sitemap Problems In Google Search Console
    March 13, 2018
    The Complete AMD Spectre Mitigation Strategy Guide Rev. 2.0
    The Complete AMD Spectre Mitigation Strategy Guide Rev. 2.0
    February 28, 2018
    The Microsoft Spectre + Meltdown Patch Schedule Rev. 2.0
    The Microsoft Spectre + Meltdown Patch Schedule Rev. 2.0
    February 23, 2018




    Research papers:

    Questions & Answers
    Am I affected by the vulnerability?

    Most certainly, yes.
    Can I detect if someone has exploited Meltdown or Spectre against me?

    Probably not. The exploitation does not leave any traces in traditional log files.
    Can my antivirus detect or block this attack?

    While possible in theory, this is unlikely in practice. Unlike usual malware, Meltdown and Spectre are hard to distinguish from regular benign applications. However, your antivirus may detect malware which uses the attacks by comparing binaries after they become known.
    What can be leaked?

    If your system is affected, our proof-of-concept exploit can read the memory content of your computer. This may include passwords and sensitive data stored on the system.
    Has Meltdown or Spectre been abused in the wild?

    We don't know.

    Is there a workaround/fix?

    There are patches against Meltdown for Linux ( KPTI (formerly KAISER)), Windows, and OS X. There is also work to harden software against future exploitation of Spectre, respectively to patch software after exploitation through Spectre ( LLVM patch, MSVC, ARM speculation barrier header).
    Which systems are affected by Meltdown?

    Desktop, Laptop, and Cloud computers may be affected by Meltdown. More technically, every Intel processor which implements out-of-order execution is potentially affected, which is effectively every processor since 1995 (except Intel Itanium and Intel Atom before 2013). We successfully tested Meltdown on Intel processor generations released as early as 2011. Currently, we have only verified Meltdown on Intel processors. At the moment, it is unclear whether AMD processors are also affected by Meltdown. According to ARM, some of their processors are also affected.

    Which systems are affected by Spectre?

    Almost every system is affected by Spectre: Desktops, Laptops, Cloud Servers, as well as Smartphones. More specifically, all modern processors capable of keeping many instructions in flight are potentially vulnerable. In particular, we have verified Spectre on Intel, AMD, and ARM processors.
    Which cloud providers are affected by Meltdown?

    Cloud providers which use Intel CPUs and Xen PV as virtualization without having patches applied. Furthermore, cloud providers without real hardware virtualization, relying on containers that share one kernel, such as Docker, LXC, or OpenVZ are affected.

    What is the difference between Meltdown and Spectre?

    Meltdown breaks the mechanism that keeps applications from accessing arbitrary system memory. Consequently, applications can access system memory. Spectre tricks other applications into accessing arbitrary locations in their memory. Both attacks use side channels to obtain the information from the accessed memory location. For a more technical discussion we refer to the papers ( Meltdown and Spectre)
    Why is it called Meltdown?

    The vulnerability basically melts security boundaries which are normally enforced by the hardware.
    Why is it called Spectre?

    The name is based on the root cause, speculative execution. As it is not easy to fix, it will haunt us for quite some time.

    Is there more technical information about Meltdown and Spectre?

    Yes, there is an academic paper and a blog post about Meltdown, and an academic paper about Spectre. Furthermore, there is a Google Project Zero blog entry about both attacks.

    What are CVE-2017-5753 and CVE-2017-5715?

    CVE-2017-5753 and CVE-2017-5715 are the official references to Spectre. CVE is the Standard for Information

    Security Vulnerability Names maintained by MITRE.

    What is the CVE-2017-5754?

    CVE-2017-5754 is the official reference to Meltdown. CVE is the Standard for Information Security Vulnerability Names maintained by MITRE.


  2. Joe C

    Joe C MDL Guru

    Jan 12, 2012
    Stop hovering to collapse... Click to collapse... Hover to expand... Click to expand...