An Update About The Variant 4 Vulnerability

An Update About The Variant 4 Vulnerability

An Update About The Variant 4 Vulnerability

An Update About The Variant 4 Vulnerability

Variant 4 CTA Banner

Researchers have recently identified a new derivative of the side-channel vulnerabilities discovered in January that potentially impact microprocessors used in some Logic Supply systems. This variant of the vulnerability is being referred to as Speculative Store Bypass, or Variant 4.

In a blog post today, Intel® said about this vulnerability, “Like the other GPZ variants, Variant 4 uses speculative execution, a feature common to most modern processor architectures, to potentially expose certain kinds of data through a side channel. In this case, the researchers demonstrated Variant 4 in a language-based runtime environment. While we are not aware of a successful browser exploit, the most common use of runtimes, like JavaScript, is in web browsers”.

Logic Supply takes the security of client data very seriously. We are working directly with Intel and our hardware vendors to determine and implement the necessary steps to ensure the continued security of our hardware and will provide any updates as they become available.

For more information please visit the links below.

Resources
Intel Blog Post About Variant 4
Intel Security First Website
Intel Software Side Channel Security Site
Intel Security Advisory INTEL-SA-00115

Variant 4 CTA Banner

Leave a Comment

Your email address will not be published.