Skip to main content
Blog
08 Jan 2018

Spectre and Meltdown

You may have seen recent press coverage regarding the ‘Spectre’ and ‘Meltdown’ vulnerabilities that affect a large number of computer processors, which run the majority of internet servers, desktops, and even mobile devices.

Both these vulnerabilities centre around malicious software being able to see things that would normally be hidden by the operating system and hardware working together.

Examples might be memory from other processes, or protected areas of the operating system. As desktop computers often run code from a variety of sources - for example, javascript - they are really quite vulnerable and should be patched as soon as possible. Smoothwall appliances however, are designed to run only code shipped directly from Smoothwall.

As such while our appliances are affected by this vulnerability, an immediate patch is not required, as there’s no route to exploit it: another, more serious exploit would be required.

Current workarounds have a negative impact on performance, and may not mitigate both bugs. Given the negative impact of early workarounds and the relatively low impact on Smoothwall systems, Smoothwall will take a more nuanced view on which mitigations to apply, and when.

Smoothwall systems in both public and private cloud are either already patched, or will be shortly, as shared infrastructure is an area where Spectre and Meltdown are potentially exploitable. For more information on the threat, click on this link https://meltdownattack.com/

Further Reading
Farewell to the 2018 SAFE Masterclass Roadshow
19 Oct 2018

Farewell to the 2018 SAFE Masterclass Roadshow

By Lauren Atkinson Read More
Introducing Smoothwall’s New Whitepaper - Digital Safeguarding: A School’s Complete Guide to Active Monitoring
09 Oct 2018

Introducing Smoothwall’s New Whitepaper - Digital Safeguarding: A School’s Complete Guide to Active Monitoring

By Lauren Atkinson Read More
Smoothwall's Women in Tech Series: Daniela Villarreal
08 Oct 2018

Smoothwall's Women in Tech Series: Daniela Villarreal

By Daniela Lackhoff Read More