> series: anatomy_of_a_breach —— part: 109 —— vulnerability: spectre_meltdown —— affected: every_modern_cpu —— duration: 20_years_of_processors<span class="cursor-blink">_</span>_
On 3 January 2018, security researchers from Google's Project Zero, academic institutions, and independent researchers simultaneously disclosed two classes of hardware vulnerabilities: Meltdown (CVE-2017-5754, primarily affecting Intel processors) and Spectre (CVE-2017-5753 and CVE-2017-5715, affecting Intel, AMD, and ARM processors). The flaws exploited speculative execution — a performance optimisation technique where processors execute instructions before knowing whether they will be needed — to leak data from protected memory areas.
The scope was unprecedented: virtually every modern processor manufactured over the previous two decades was affected. Every desktop, laptop, server, smartphone, and cloud instance running on Intel, AMD, or ARM chips was potentially vulnerable. Unlike Heartbleed (software) or Shellshock (software), Spectre and Meltdown were hardware vulnerabilities that could not be fully patched in software — only mitigated, and at a measurable performance cost. The disclosures prompted emergency patching across every major operating system and cloud provider, and fundamentally changed how the industry thinks about hardware security.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping CallSpectre and Meltdown completed the lesson that Heartbleed (cryptographic libraries), Shellshock (system shells), and KRACK (wireless protocols) had begun: no layer of the technology stack is immune to critical vulnerabilities. Security must be implemented at every layer — hardware, operating system, network, application, and human — because vulnerabilities at any layer can compromise the entire system.
Cyber Essentials mandates patching across all layers. Our vulnerability scanning identifies systems requiring mitigations. Infrastructure testing assesses the effectiveness of applied mitigations. SOC in a Box monitors for exploitation attempts. And UK Cyber Defence provides incident response when hardware-level vulnerabilities are actively exploited.
<a href="/vulnerability-scanning">Vulnerability scanning</a> identifies unmitigated systems. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> verifies mitigations. <a href="/cyber-essentials">Cyber Essentials</a> mandates patching at every layer.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call