Anatomy of a Breach

Anatomy of a Breach: Spectre and Meltdown — The CPU Flaws That Proved Hardware Is Not Immune

> series: anatomy_of_a_breach —— part: 109 —— vulnerability: spectre_meltdown —— affected: every_modern_cpu —— duration: 20_years_of_processors<span class="cursor-blink">_</span>_

Hedgehog Security 31 January 2018 13 min read

Every processor. Every computer. Every cloud server. For twenty years. Vulnerable.

On 3 January 2018, security researchers from Google's Project Zero, academic institutions, and independent researchers simultaneously disclosed two classes of hardware vulnerabilities: Meltdown (CVE-2017-5754, primarily affecting Intel processors) and Spectre (CVE-2017-5753 and CVE-2017-5715, affecting Intel, AMD, and ARM processors). The flaws exploited speculative execution — a performance optimisation technique where processors execute instructions before knowing whether they will be needed — to leak data from protected memory areas.

The scope was unprecedented: virtually every modern processor manufactured over the previous two decades was affected. Every desktop, laptop, server, smartphone, and cloud instance running on Intel, AMD, or ARM chips was potentially vulnerable. Unlike Heartbleed (software) or Shellshock (software), Spectre and Meltdown were hardware vulnerabilities that could not be fully patched in software — only mitigated, and at a measurable performance cost. The disclosures prompted emergency patching across every major operating system and cloud provider, and fundamentally changed how the industry thinks about hardware security.


Recommended

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

From silicon to cloud — every layer affected.

Hardware Cannot Be Fully Patched
Software vulnerabilities can be patched completely — the vulnerable code is replaced. Hardware vulnerabilities in CPU architecture can only be mitigated through software workarounds that prevent exploitation but cannot remove the underlying flaw. Complete remediation requires new processor designs. Our <a href="/vulnerability-scanning">vulnerability scanning</a> identifies systems requiring Spectre/Meltdown mitigations.
Cloud Multi-Tenancy at Risk
In cloud environments where multiple customers share the same physical processor, Spectre-class attacks could theoretically allow one tenant to read another tenant's data from shared CPU caches. This fundamentally challenged the isolation guarantees of cloud computing. Our <a href="/penetration-testing/cloud-configuration-review">cloud configuration reviews</a> assess cloud security including isolation controls.
Performance Impact of Mitigations
The software mitigations for Spectre and Meltdown came with performance penalties — ranging from negligible to 30% depending on workload. Organisations faced a choice between security and performance. <a href="/cyber-essentials">Cyber Essentials</a> mandates that security patches are applied; performance impact does not exempt organisations from patching obligations.
Twenty Years of Vulnerable Processors
The speculative execution techniques exploited by Spectre and Meltdown had been built into processors since the mid-1990s. Like <a href="/blog/anatomy-of-a-breach-shellshock">Shellshock's</a> 25-year latency, the discovery demonstrated that foundational technology assumptions can harbour critical vulnerabilities for decades. <a href="https://www.socinabox.co.uk">SOC in a Box</a> monitors for exploitation attempts against known hardware vulnerabilities.

Trust no layer. Not even the silicon.

Spectre and Meltdown completed the lesson that Heartbleed (cryptographic libraries), Shellshock (system shells), and KRACK (wireless protocols) had begun: no layer of the technology stack is immune to critical vulnerabilities. Security must be implemented at every layer — hardware, operating system, network, application, and human — because vulnerabilities at any layer can compromise the entire system.

Cyber Essentials mandates patching across all layers. Our vulnerability scanning identifies systems requiring mitigations. Infrastructure testing assesses the effectiveness of applied mitigations. SOC in a Box monitors for exploitation attempts. And UK Cyber Defence provides incident response when hardware-level vulnerabilities are actively exploited.


Spectre and Meltdown proved the silicon is not safe. Have your mitigations been applied and verified?

<a href="/vulnerability-scanning">Vulnerability scanning</a> identifies unmitigated systems. <a href="/penetration-testing/infrastructure">Infrastructure testing</a> verifies mitigations. <a href="/cyber-essentials">Cyber Essentials</a> mandates patching at every layer.

Next Step

Not sure where to start?

We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.

Free Scoping Call

Related Articles