Vulnerabilities / Threats //

Vulnerability Management

1/4/2019
03:35 PM

How Intel Has Responded to Spectre and Meltdown

In a newly published editorial and video, Intel details what specific actions it has taken in the wake of the discovery of the CPU vulnerabilities.
2 of 7

The Intel Product Assurance and Security (IPAS) Group
One of Intel's first public statements after the disclosure was its statement of a Security First Pledge. One of the ways in which it brought that pledge into the real world was through the creation of the Intel Product Assurance and Security Group.
In the statement announcing the creation of the group, its general manager, Leslie Culbertson, wrote, 'IPAS is designed to serve as a center of security excellence -- a sort of mission control -- that looks across all of Intel. Beyond addressing the security issues of today, we are looking longer-term at the evolving threat landscape and continuously improving product security in the years ahead.'
In its response to the speculative execution vulnerabilities, Intel has also increased its emphasis on security across all its product lines. It has created groups like STORM - the strategic offensive research and mitigation group, to conduct research on security across its chips and systems. In conducting its own offensive research, Intel is trying to move beyond points like those raised by Richard Ford, chief scientist at Forcepoint, who said that Intel (and other vendors) had found themselves creating ad hoc, point mitigations rather than long-term fixes. They were, he said, '...waiting until a researcher comes up with a new vulnerability of this type and responding to it, rather than trying to put an end to the entire line of vulnerabilities.'
(Image: Bru-n0 VIA Pixabay)

The Intel Product Assurance and Security (IPAS) Group

One of Intel's first public statements after the disclosure was its statement of a Security First Pledge. One of the ways in which it brought that pledge into the real world was through the creation of the Intel Product Assurance and Security Group.

In the statement announcing the creation of the group, its general manager, Leslie Culbertson, wrote, "IPAS is designed to serve as a center of security excellence - a sort of mission control - that looks across all of Intel. Beyond addressing the security issues of today, we are looking longer-term at the evolving threat landscape and continuously improving product security in the years ahead."

In its response to the speculative execution vulnerabilities, Intel has also increased its emphasis on security across all its product lines. It has created groups like STORM the strategic offensive research and mitigation group, to conduct research on security across its chips and systems. In conducting its own offensive research, Intel is trying to move beyond points like those raised by Richard Ford, chief scientist at Forcepoint, who said that Intel (and other vendors) had found themselves creating ad hoc, point mitigations rather than long-term fixes. They were, he said, "waiting until a researcher comes up with a new vulnerability of this type and responding to it, rather than trying to put an end to the entire line of vulnerabilities."

(Image: Bru-n0 VIA Pixabay)

2 of 7
Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3906
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 contains hardcoded credentials in the WCF service on port 9003. An authenticated remote attacker can use these credentials to access the badge system database and modify its contents.
CVE-2019-3907
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores user credentials and other sensitive information with a known weak encryption method (MD5 hash of a salt and password).
CVE-2019-3908
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 stores backup files as encrypted zip files. The password to the zip is hard-coded and unchangeable. An attacker with access to these backups can decrypt them and obtain sensitive data.
CVE-2019-3909
PUBLISHED: 2019-01-18
Premisys Identicard version 3.1.190 database uses default credentials. Users are unable to change the credentials without vendor intervention.
CVE-2019-3910
PUBLISHED: 2019-01-18
Crestron AM-100 before firmware version 1.6.0.2 contains an authentication bypass in the web interface's return.cgi script. Unauthenticated remote users can use the bypass to access some administrator functionality such as configuring update sources and rebooting the device.