On the morning of May 15, Beijing time, Intel and a team of security researchers said on Tuesday that they had found a series of new security vulnerabilities in their processors that were difficult to fix and linked to problems discovered last year.
Intel called the newly discovered vulnerability "micro-architecture data sampling", or MDS for short. The hacker could use the vulnerability to read almost all of the data flowing through one of Intel's chips, but the company said the attack was difficult to implement and has not seen it used outside the lab.
The Intel chip released this year contains fixes for this vulnerability. But in a post announcing the news, Intel said that previous generations of chips also need to be patched. In some cases, the fix may reduce chip performance by 19%.
Intel revealed last year that hackers may use a feature called "conjecture execution" to read sensitive data on its processors, which chips will use to guess which calculations will be performed in advance to speed up the chip.
The so-called Meltdown and Spectre瑕疵 are also known as sidewalk attacks. These flaws and Intel's public relations strategy have caused its share price to fall as investors believe that Intel customers are having trouble installing patches and degrading performance. Legislators also throw a question to Intel: Why did they not disclose this vulnerability to US cybersecurity officials before public disclosure?
Security researchers and Intel said at the time that similar side-by-side vulnerabilities could be discovered in the future. Intel said on Tuesday that the company's security researchers have discovered these new flaws, and external security researchers have reported them to them.