Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Security Management //

Patch Management

2/20/2018
10:20 AM
Scott Ferguson
Scott Ferguson
News Analysis-Security Now
50%
50%

Intel Faces 32 Lawsuits Over Spectre & Meltdown Vulnerabilities

In a filing with the SEC, Intel disclosed that it faces 32 different class action lawsuits related to the Spectre and Meltdown vulnerabilities.

Intel's headaches from the Spectre and Meltdown vulnerabilities that were disclosed earlier this year continue to multiply, with the company facing a series of class action lawsuits.

In a filing with the US Securities and Exchange Commission, Intel Corp. (Nasdaq: INTC) disclosed that it is now facing 32 different lawsuits from customers, as well as company investors. The company's annual 10-K report, which covers the entire 2017 fiscal year that ended on December 31, notes that the chip maker expects these lawsuits to drag on for a number of years.

In one section about litigation, Intel notes:

Given the procedural posture and the nature of these cases, including that the proceedings are in the early stages, that alleged damages have not been specified, that uncertainty exists as to the likelihood of a class or classes being certified or the ultimate size of any class or classes if certified, and that there are significant factual and legal issues to be resolved, we are unable to make a reasonable estimate of the potential loss or range of losses, if any, that might arise from these matters.

It's also not clear how many more lawsuits Intel could face related to Spectre and Meltdown.

(Source: Wikimedia)
(Source: Wikimedia)

The 10-K noted that the 32 lawsuits are only the ones known to the company as of February 15 -- the day before the paperwork was filed with the SEC. How many more may follow, especially as the scope of the vulnerabilities becomes better known, is difficult to assess.

For its part, Intel disputes the claims in the 32 lawsuits, according to the document.

In January, a research paper detailed what became known as Spectre and Meltdown, which are also known as side-channel vulnerabilities. The research found that by manipulating pre-executed commands within x86 chips, which help make data available faster, hackers can gain access to the content of the kernel memory. The security issue is that this flaw can allow a hacker to gain access to encryption keys and other authentication details of whatever system the CPU is running in.

While the January research paper brought Spectre and Meltdown to light for the public, the 10-K notes that Google (Nasdaq: GOOG) had warned the company in June about the vulnerabilities.


The fundamentals of network security are being redefined – don't get left in the dark by a DDoS attack! Join us in Austin from May 14-16 at the fifth annual Big Communications Event. There's still time to register and communications service providers get in free!

For its part, Intel has taken the brunt of the fallout from the disclosure, although ARM Ltd. (Nasdaq: ARMHY; London: ARM) and Advanced Micro Devices Inc. (NYSE: AMD) have also faced questions about Spectre and Meltdown. (See Congressman Looking for Answers About Spectre & Meltdown.)

During a recent call with financial analysts, Intel CEO Brian Krzanich didn't spend much time discussing the issue, although he did promise that patches were coming and that the company would eliminate these types of side-channel vulnerabilities in future silicon. (See Intel CEO Promises Chips That Fix Spectre & Meltdown Flaws .)

So far, Intel's response has been met with a healthy level of skepticism. (See Linus Torvalds: Intel's Spectre Patch Is 'Complete & Utter Garbage'.)

On February 16, ZDNet reported on a new research paper that says attackers may find new ways to exploit these side-channel vulnerabilities. However, researchers have previously noted that Spectre and Meltdown are extremely difficult to take advantage of, and it's not known if any group has managed to exploit the two vulnerabilities yet.

Related posts:

— Scott Ferguson, Editor, Enterprise Cloud News. Follow him on Twitter <a

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5669
PUBLISHED: 2021-10-26
Cross-site scripting vulnerability in Movable Type Movable Type Premium 1.37 and earlier and Movable Type Premium Advanced 1.37 and earlier allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.
CVE-2021-40343
PUBLISHED: 2021-10-26
An issue was discovered in Nagios XI 5.8.5. Insecure file permissions on the nagios_unbundler.py file allow the nagios user to elevate their privileges to the root user.
CVE-2021-40344
PUBLISHED: 2021-10-26
An issue was discovered in Nagios XI 5.8.5. In the Custom Includes section of the Admin panel, an administrator can upload files with arbitrary extensions as long as the MIME type corresponds to an image. Therefore it is possible to upload a crafted PHP script to achieve remote command execution.
CVE-2021-40345
PUBLISHED: 2021-10-26
An issue was discovered in Nagios XI 5.8.5. In the Manage Dashlets section of the Admin panel, an administrator can upload ZIP files. A command injection (within the name of the first file in the archive) allows an attacker to execute system commands.
CVE-2021-42343
PUBLISHED: 2021-10-26
An issue was discovered in Dask (aka python-dask) through 2021.09.1. Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (ty...