Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management //

Patch Management

10:20 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now

Intel Faces 32 Lawsuits Over Spectre & Meltdown Vulnerabilities

In a filing with the SEC, Intel disclosed that it faces 32 different class action lawsuits related to the Spectre and Meltdown vulnerabilities.

Intel's headaches from the Spectre and Meltdown vulnerabilities that were disclosed earlier this year continue to multiply, with the company facing a series of class action lawsuits.

In a filing with the US Securities and Exchange Commission, Intel Corp. (Nasdaq: INTC) disclosed that it is now facing 32 different lawsuits from customers, as well as company investors. The company's annual 10-K report, which covers the entire 2017 fiscal year that ended on December 31, notes that the chip maker expects these lawsuits to drag on for a number of years.

In one section about litigation, Intel notes:

Given the procedural posture and the nature of these cases, including that the proceedings are in the early stages, that alleged damages have not been specified, that uncertainty exists as to the likelihood of a class or classes being certified or the ultimate size of any class or classes if certified, and that there are significant factual and legal issues to be resolved, we are unable to make a reasonable estimate of the potential loss or range of losses, if any, that might arise from these matters.

It's also not clear how many more lawsuits Intel could face related to Spectre and Meltdown.

The 10-K noted that the 32 lawsuits are only the ones known to the company as of February 15 -- the day before the paperwork was filed with the SEC. How many more may follow, especially as the scope of the vulnerabilities becomes better known, is difficult to assess.

For its part, Intel disputes the claims in the 32 lawsuits, according to the document.

In January, a research paper detailed what became known as Spectre and Meltdown, which are also known as side-channel vulnerabilities. The research found that by manipulating pre-executed commands within x86 chips, which help make data available faster, hackers can gain access to the content of the kernel memory. The security issue is that this flaw can allow a hacker to gain access to encryption keys and other authentication details of whatever system the CPU is running in.

While the January research paper brought Spectre and Meltdown to light for the public, the 10-K notes that Google (Nasdaq: GOOG) had warned the company in June about the vulnerabilities.

The fundamentals of network security are being redefined – don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth annual Big Communications Event. There's still time to register and communications service providers get in free!

For its part, Intel has taken the brunt of the fallout from the disclosure, although ARM Ltd. (Nasdaq: ARMHY; London: ARM) and Advanced Micro Devices Inc. (NYSE: AMD) have also faced questions about Spectre and Meltdown. (See Congressman Looking for Answers About Spectre & Meltdown.)

During a recent call with financial analysts, Intel CEO Brian Krzanich didn't spend much time discussing the issue, although he did promise that patches were coming and that the company would eliminate these types of side-channel vulnerabilities in future silicon. (See Intel CEO Promises Chips That Fix Spectre & Meltdown Flaws .)

So far, Intel's response has been met with a healthy level of skepticism. (See Linus Torvalds: Intel's Spectre Patch Is 'Complete & Utter Garbage'.)

On February 16, ZDNet reported on a new research paper that says attackers may find new ways to exploit these side-channel vulnerabilities. However, researchers have previously noted that Spectre and Meltdown are extremely difficult to take advantage of, and it's not known if any group has managed to exploit the two vulnerabilities yet.

Related posts:

— Scott Ferguson, Editor, Enterprise Cloud News. Follow him on Twitter <a

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-08-11
A Cross-Site Request Forgery (CSRF) vulnerability was discovered in the System Management Interface Web component of Avaya Aura Communication Manager and Avaya Aura Messaging. This vulnerability could allow an unauthenticated remote attacker to perform Web administration actions with the privileged ...
PUBLISHED: 2020-08-11
An issue was discovered in certain configurations of GNOME gnome-shell through 3.36.4. When logging out of an account, the password box from the login dialog reappears with the password still visible. If the user had decided to have the password shown in cleartext at login time, it is then visible f...
PUBLISHED: 2020-08-11
django-celery-results through 1.2.1 stores task results in the database. Among the data it stores are the variables passed into the tasks. The variables may contain sensitive cleartext information that does not belong unencrypted in the database.
PUBLISHED: 2020-08-11
There is a possible out of bounds read due to an incorrect bounds check.Product: AndroidVersions: Android SoCAndroid ID: A-152225183
PUBLISHED: 2020-08-11
The Temi application 1.3.3 through 1.3.7931 for Android has hard-coded credentials.