Intel L1 Terminal Fault (L1TF) Chip Vulnerabilities

Intel has just disclosed three more vulnerabilities in its processors we need to make you aware of. These can be exploited by malware to potentially steal data from computer memory. This data can include passwords, encryption keys, and other confidential information. These flaws has been dubbed the ‘L1 Terminal Fault (L1TF) bug’, because they extract secret data from the CPU level-one data cache.

Across the board, desktops, laptops, and server CPUs from Intel are vulnerable. Essentially the flaw allows system memory that has been marked off limits, to be accessed anyway. This means malicious software on a vulnerable machine, and guest VM’s, can steal sensitive data from other guest VM’s.

Although we are not aware of any reports that any of these methods have been used in real-world expoits, we highly recommend this issue be addressed wherever applicable. New software updates are already being issued today in order to mitigate this issue. It is highly recommended to apply these patches as they become available.

How can Appalachia Technologies help?
For our ATManage customers, we are already on top of this issue. As patches are released, we will patch your systems.

For ATProtect customers, we are already proactively monitoring for signs of malicious activity or exploits. If we detect any activity related to this exploit, our SOW will investigate work with you to address any potential infections.

To learn how to become an ATManage or ATProtect customer, contact us at:  atsales@appalachiatech.com

For more details, visit Intel at:  https://www.intel.com/content/www/us/en/architecture-and-technology/l1tf.html