Patch fast to avoid chip security flaw if on Cloud: Experts

IANS  |  New Delhi 

With confirming a potential security flaw in its chips that is vulnerable to hacking, cyber security experts on Thursday advised enterprises running businesses on to install available security patches without delay.

experts have discovered two major security flaws in chips. One is called "Meltdown" that impacts only chips while the other called "Spectre" affects all chips, including ARM and

It's a fairly major and allows a malware to read memory of other processes.

"As they are hardware bugs, patching is a significant job. Patches against 'Meltdown' have been issued for Linux, Windows and OS X and work is underway to strengthen software against future exploitation of 'Spectre,'" said Senior Security Researchers Ido Naor and Jornt van der Wiel from Kaspersky Lab's Global Research and Analysis Team (GreAT).

has a tool people can use to check if their systems are vulnerable to the bugs.

"It is vital that users install any available patches without delay. It will take time for attackers to figure out how to exploit the vulnerabilities -- providing a small but critical window for protection," the experts advised.

on Thursday issued emergency updates to supported versions of Windows.

said it was working with its tech partners such as AMD, and several vendors to develop an industry-wide approach to resolve this issue "promptly and constructively".

"This issue represents a higher risk in environments because it would be easy to create an AWS or Azure account, start a new instance and then run the exploit to dump memory of the server which would be hosting many other instances of other customers," said K.K. Mookhey, of Network Intelligence, a cyber security consulting firm.

Patches from most major have become available for "Meltdown". Most service providers have also rolled out patches and issued advisories.

"For the enterprise customers who are not on the Cloud, this issue isn't going to bring the skies crashing down as it's not remotely exploitable. So launching the attack would first require compromising the network and systems using some other means of attack," Mookhey noted.

--IANS

na/dg

(This story has not been edited by Business Standard staff and is auto-generated from a syndicated feed.)

First Published: Thu, January 04 2018. 17:10 IST