Important: CPU vulnerabilities make servers and computers unsafe

Intel CPUAs announced today worldwide, Intel CPU, but also in processors from other manufacturers, has massive CPU vulnerabilities that allow attackers to grab data and continue to use it! Passwords can also be intercepted!

As Heise (CT) writes, Intel has probably known these security flaws since June 2017, and Intel CEO Brian Krzanich has probably used his insider knowledge to repel a mass of Intel shares worth over 24 million US dollars! How we and you can protect yourself….

Vulnerabilities listed in CVE

Variant 1: Bounds check Bypass (CVE-2017-5753)
Variant 2: Branch target Injection (CVE-2017-5715)
Variant 3: Rogue data Cache Load (CVE-2017-5754)

In part, the CVEs in the page CVE-details are not yet available, as today has become known!

Consequences of these CPU vulnerabilities

Patches are currently being programmed under high pressure from all manufacturers of operating systems, which will be available from 09. January 2018! However, some of these patches are already delivered-but beware that too early play can trigger further dangers!

Various firewalls will become unsafe if you start the patches too soon!

You must be absolutely sure of the products Kaspersky etc. Wait before you install the operating system patches that the firewall programs were previously updated! Some of the patches of the programs are not ready yet! So just install the Windows 10 updates if you are sure your firewall is closing the Windows 10 updates on these vulnerabilities with your own updates!

Internet, server and computer

Servers and all computers worldwide that use Intel CPUs are becoming more and more unassured! For processors of other manufacturers, there are fewer dangers, but 1 out of 3 dangers are also present on these processors!

Operating system vendors are working on patches to close the vulnerabilities of CPUs

However, this may cause the CPUs to 30% can slow down! You will surely be working to compensate for this performance loss again later!

Browser settings can prevent web pages in other windows from being able to remove data from other open browser sessions!

Only a few browsers offer protection, this includes the Google Chrome and opera, which with a command to protect the extraction of the data from a browser window from the other browser window! Use the command in Google Chrome and opera best:

chrome://flags/#enable-Site-per-process

1AWWW servers and updates in the next few days:

We regularly ensure that the important security patches are recorded! No updates are yet known that close 100% of all security vulnerabilities! All other hosters who use the same technology have no advantages here and also wait for the necessary patches!

Please understand that we will upgrade existing systems in the next few days, directly when patches are issued. As a rule, servers will only be unavailable for 5-15 minutes!

If we receive new information, we will inform you about our blog!

Leave a Reply

Your email address will not be published. Required fields are marked *