Jan 4, 2018 3 min read

Meltdown & Spectre

Meltdown & Spectre

What Are They?

They both exploit critical vulnerabilities in modern day processors. If exploited successfully, a program would be able to read memory of another process or kernel. As you can imagine, this represents a significant security risk. For example privilege escalation, JavaScript running on a victim's browser could potentially steal session cookies, or a service running on a web server could steal the private key of the web server's certificate, and the list goes on.

Since cloud providers (such as AWS, AWS and Google) systems run off affected processors, VM instances running on these servers will also be affected.



Meltdown allows an unprivileged process to access privileged kernel memory. This would allow for privilege escalation. Meltdown affects almost every Intel processor since 1995. It also appears to affect some ARM chips as well.

Working POCs have been developed, so this is a real danger:



Spectre, unlike meltdown, does not allow an unprivileged process to access privileged kernel memory. This would most likely to help a process within a sandbox environment to leak data. This affects almost all current day processors including those from Intel, AMD and ARM.

What Do I Need To Do?

As always make sure that you patch your software!. Also you can reduce risk by performing actions such as installing a Ad Blocker on your browser, and disabling JavaScript (this might not be a great viable solution since many sites rely on JavaScript to function).

Cloud providers are ready actively patching their servers, so ensure that you follow any communication from your cloud provider.


Ensure that you install any software and OS updates. Windows is currently releasing an emergency patch. Linux has a fix in the kernel, but this may take a few days to reach all the Linux distos. MacOS has already patched the issue (since version 10.13.2).

However there is a negative side affect of a downgraded performance. Figures are any where from a 5% degradation all the way to 30%. The amount of performance hit will vary based on differing scenarios such as how many threads are being used, what application is running (some applications appear to be more affected than others), OS (these figures where based on Linux, there is suspicion that Windows will be less affected), etc.


Unfortunately the only known way to address this issue is via a hardware fix. Thankfully this is harder to exploit than Meltdown.

Additional Reading

There are some good summaries and writeups by others:

Sean Wright
Sean Wright
Experienced application security engineer with an origin as a software developer. Primarily focused on web-based application security with a special interest in TLS and supply chain related subjects.
Great! You’ve successfully signed up.
Welcome back! You've successfully signed in.
You've successfully subscribed to Sean Wright.
Your link has expired.
Success! Check your email for magic link to sign-in.
Success! Your billing info has been updated.
Your billing was not updated.