Sponsored By

Intel Faces 32 Lawsuits Over Spectre & Meltdown Vulnerabilities

In a filing with the SEC, Intel disclosed that it faces 32 different class action lawsuits related to the Spectre and Meltdown vulnerabilities.

Scott Ferguson

February 20, 2018

4 Min Read

Intel's headaches from the Spectre and Meltdown vulnerabilities that were disclosed earlier this year continue to multiply, with the company facing a series of class action lawsuits.

In a filing with the US Securities and Exchange Commission, Intel Corp. (Nasdaq: INTC) disclosed that it is now facing 32 different lawsuits from customers, as well as company investors. The company's annual 10-K report, which covers the entire 2017 fiscal year that ended on December 31, notes that the chip maker expects these lawsuits to drag on for a number of years.

In one section about litigation, Intel notes:

"Given the procedural posture and the nature of these cases, including that the proceedings are in the early stages, that alleged damages have not been specified, that uncertainty exists as to the likelihood of a class or classes being certified or the ultimate size of any class or classes if certified, and that there are significant factual and legal issues to be resolved, we are unable to make a reasonable estimate of the potential loss or range of losses, if any, that might arise from these matters."

It's also not clear how many more lawsuits Intel could face related to Spectre and Meltdown.

(Source: Wikimedia)

(Source: Wikimedia)

The 10-K noted that the 32 lawsuits are only the ones known to the company as of February 15 -- the day before the paperwork was filed with the SEC. How many more may follow, especially as the scope of the vulnerabilities becomes better known, is difficult to assess.

For its part, Intel disputes the claims in the 32 lawsuits, according to the document.

In January, a research paper detailed what became known as Spectre and Meltdown, which are also known as side-channel vulnerabilities. The research found that by manipulating pre-executed commands within x86 chips, which help make data available faster, hackers can gain access to the content of the kernel memory. The security issue is that this flaw can allow a hacker to gain access to encryption keys and other authentication details of whatever system the CPU is running in.

While the January research paper brought Spectre and Meltdown to light for the public, the 10-K notes that Google (Nasdaq: GOOG) had warned the company in June about the vulnerabilities.

The fundamentals of network security are being redefined – don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth annual Big Communications Event. There's still time to register and communications service providers get in free!

For its part, Intel has taken the brunt of the fallout from the disclosure, although ARM Ltd. (Nasdaq: ARMHY; London: ARM) and Advanced Micro Devices Inc. (NYSE: AMD) have also faced questions about Spectre and Meltdown. (See Congressman Looking for Answers About Spectre & Meltdown.)

During a recent call with financial analysts, Intel CEO Brian Krzanich didn't spend much time discussing the issue, although he did promise that patches were coming and that the company would eliminate these types of side-channel vulnerabilities in future silicon. (See Intel CEO Promises Chips That Fix Spectre & Meltdown Flaws .)

So far, Intel's response has been met with a healthy level of skepticism. (See Linus Torvalds: Intel's Spectre Patch Is 'Complete & Utter Garbage'.)

On February 16, ZDNet reported on a new research paper that says attackers may find new ways to exploit these side-channel vulnerabilities. However, researchers have previously noted that Spectre and Meltdown are extremely difficult to take advantage of, and it's not known if any group has managed to exploit the two vulnerabilities yet.

Related posts:

— Scott Ferguson, Editor, Enterprise Cloud News. Follow him on Twitter <a

Read more about:

Security Now

About the Author(s)

Scott Ferguson

Managing Editor, Light Reading

Prior to joining Enterprise Cloud News, he was director of audience development for InformationWeek, where he oversaw the publications' newsletters, editorial content, email and content marketing initiatives. Before that, he served as editor-in-chief of eWEEK, overseeing both the website and the print edition of the magazine. For more than a decade, Scott has covered the IT enterprise industry with a focus on cloud computing, datacenter technologies, virtualization, IoT and microprocessors, as well as PCs and mobile. Before covering tech, he was a staff writer at the Asbury Park Press and the Herald News, both located in New Jersey. Scott has degrees in journalism and history from William Paterson University, and is based in Greater New York.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights