Old-gen and current-gen consoles, AMD CPUs and smartphones are also vulnerable to the Spectre threat

Yesterday, a lot of AMD fans were celebrating as it was discovered that Intel’s CPUs were affected by a fundamental design flaw (codenamed ‘Meltdown‘). And while this issue has been addressed by Microsoft and Intel, another design flaw has surfaced that affects all CPUs. Codenamed ‘Spectre‘, this security threat can affect old-gen and current-gen consoles, handhelds, smartphones, and PC systems using both Intel’s and AMD’s CPUs.

While Spectre is more difficult to exploit than Meltdown (the design flaw that affected Intel’s CPUs), it affects every modern CPU and there is currently no fix for it. This basically means that both Intel and AMD will have to completely change the architecture of their future processors in order to fix it on a hardware level.

Spectre breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets. Contrary to Meltdown, Spectre tricks other applications into accessing arbitrary locations in their memory.

We don’t know what Microsoft, Intel, Sony, Nintendo and AMD will do in order to resolve this security issue. According to Google, it is possible to prevent specific known exploits based on Spectre through software patches. However, this may result in an additional performance hit once and if such a patch comes out. Furthermore, this potential performance hit will affect all platforms, both consoles and PC systems.

Right now Microsoft has only issued a security fix for Meltdown and there hasn’t been any software patch for Spectre!

41 thoughts on “Old-gen and current-gen consoles, AMD CPUs and smartphones are also vulnerable to the Spectre threat”

        1. I’ve been trained by the internet to never overestimate someone’s intelligence. That said, I had a good laugh 😀

    1. That’s not gonna happen. Not even close. This exploit and the 3rd variant (Meltdown), rely on access to kernel address space. The fix for all variants degrades performance in scenarios with lots of syscalls. The key difference is that variant 1 and 2 affect far more devices than variant 3. And while Variants 1 and 2 affect AMD chips, the fact that AMD chips don’t use speculative execution reduces the chance of Spectre attacks to near zero.

      1. That was for the lolz considering how they can’t maintain a 30FPS framerate… Of course it won’t be the case… Stop killing the fun 😉

  1. Spectre is a pain to fix and to hard to exploit. As fir melt and zen is immune intel is ubber boned because of decade old flaw

  2. What I am interested is can you use this to jailbreak ps4/pro and xbox1/s/x and run games obtained by other ways? 🙂

  3. AMD is only vulnerable to variant 1 (spectre), which is easily resolved with basically no performance hit. Nice!

    Also, 3 flaws now, so the problem tripled! Variants 2 and 3 (Meltdown) affect ARM and Intel only. Not nice!

  4. spoiler alert this is all a conspiracy to add more backdoors onto your hardware/bios/etc like intel has openly admitted to doing with the nsa/etc

    rumors been going around for awhile of a false flag cyber terrorist attack. this is the setup. be warned. be prepared.stay safe.god bless.

  5. AMD Statement:

    Variant One
    Bounds Check Bypass
    Resolved by software / OS updates to be made available by system
    vendors and manufacturers. Negligible performance impact expected.
    Variant Two
    Branch Target Injection
    Differences in AMD architecture mean there is a near zero risk of
    exploitation of this variant. Vulnerability to Variant 2 has not been
    demonstrated on AMD processors to date.
    Variant Three
    Rogue Data Cache Load
    Zero AMD vulnerability due to AMD architecture differences.

  6. Soo…

    Guess i’ll just fkoff from the cpu market for the next 2gens. There’s no way they’re going to modify upcoming gens like that. That stuff takes time i suppose.

Leave a Reply

Your email address will not be published. Required fields are marked *