Illustration: Rebecca Zisser / Axios

A nasty series of vulnerabilities affecting decades of chip processors from Intel and others is the root of the broadest security hole to date, affecting nearly all computers, smartphones and servers. Companies including Apple, Amazon, Microsoft and Google are scrambling to provide software updates to their operating systems and cloud services — but researchers said the software makers can't fully address the holes the chips left open.

The bottom line: While one vulnerability is potentially limited to just Intel chips, a related flaw affects the chips used in nearly every modern device.

That means you'll want to be sure to install the latest updates for your computers, phones and tablets and even your browser. Cloud providers like Amazon's AWS and Microsoft's Azure will need updates, as will large web service providers that operate their own data centers. And even then you are only partially protected.

How the flaws work: The vulnerability is created by how chips do what is known as "speculative execution" — basically using their spare time to take on tasks that haven't specifically been requested. Unfortunately, researchers have demonstrated that the way chips handle such tasks also could give a malicious program access to protected parts of a computer's memory. There's a good explainer with more detail here.

What's affected: Virtually every device that runs on a modern chip, as well as the cloud services used by consumers and businesses. There are two separate classes of attacks.

  • One set, known as "Meltdown," seems limited to Intel processors made since 1995. Researchers say the issue can be addressed via a software update, but with a potentially significant impact on performance.
  • Another called "Spectre" affects all manner of modern chips, including processors from rival AMD as well as the ARM-based chips used in smartphones and other devices. This broader issue is harder to exploit, but also harder to address, with no one cure-all likely to work.
  • Researchers also demonstrated how a similar attack could also be used within a browser, so Mozilla, Google and other browser makers are also updating those programs.

How it happened: Researchers from Google's Project Zero and other security experts found the issue last year and reported it to AMD, Intel and ARM last June. Since then, the companies have been working on solutions. All the affected companies had planned to disclose the vulnerability next week, but moved forward the announcement as details, as well as proof-of-concept exploit code, began to leak out.

Industry response: Here's what the tech giants are doing to address the problem.

  • Microsoft issued updates for Windows 10, Windows 8 and Windows 7 as well as for its Azure cloud operating system
  • Amazon said Wednesday afternoon that "all but a small single-digit percentage of instances across the Amazon EC2 fleet" were already protected, with the remaining ones set to be finished in a few hours.
  • Google said it has released updates to Android and Chrome OS to address the issue and also has a feature in Chrome that users should turn on a feature known as "site isolation."
  • As of Wednesday evening, Apple had yet to comment on how its products are impacted.
  • Intel said it has been working with operating system vendors and hardware makers on industrywide approaches to addressing the issue and will also design future chips to avoid the issue.

The costs: Despite how widespread the problem is, Intel says it doesn't expect any significant financial impact. Other potential costs will be born by software makers creating patches and those that may see a performance impact from the software patches needed to close the security hole. It's also possible class-action lawyers may see this as a prime opportunity to litigate.

Get more stories like this by signing up for our daily tech newsletter, Login.

Go deeper

1 hour ago - Podcasts

Facebook boycott organizers share details on their Zuckerberg meeting

Facebook is in the midst of the largest ad boycott in its history, with nearly 1,000 brands having stopped paid advertising in July because they feel Facebook hasn't done enough to remove hate speech from its namesake app and Instagram.

Axios Re:Cap spoke with the boycott's four main organizers, who met on Tuesday with CEO Mark Zuckerberg and other top Facebook executives, to learn why they organized the boycott, what they took from the meeting, and what comes next.

Boycott organizers slam Facebook following tense virtual meeting

Illustration: Sarah Grillo/Axios

Civil rights leaders blasted Facebook's top executives shortly after speaking with them on Tuesday, saying that the tech giant's leaders "failed to meet the moment" and were "more interested in having a dialogue than producing outcomes."

Why it matters: The likely fallout from the meeting is that the growing boycott of Facebook's advertising platform, which has reached nearly 1000 companies in less than a month, will extend longer than previously anticipated, deepening Facebook's public relations nightmare.

Steve Scalise PAC invites donors to fundraiser at Disney World

Photo: Kevin Lamarque-Pool/Getty Images

House Minority Whip Steve Scalise’s PAC is inviting lobbyists to attend a four-day “Summer Meeting” at Disney World's Polynesian Village in Florida, all but daring donors to swallow their concern about coronavirus and contribute $10,000 to his leadership PAC.

Why it matters: Scalise appears to be the first House lawmakers to host an in-person destination fundraiser since the severity of pandemic became clear. The invite for the “Summer Meeting” for the Scalise Leadership Fund, obtained by Axios, makes no mention of COVID-19.