Subscribe To Our Daily Enewsletter:

Intel Confirms Security Issue, Denies Patches Will Impact Performance

In a carefully worded statement, Intel confirmed a widely reported security vulnerability, but denied the issue was unique to its products. The chip giant also rejected media reports suggesting that forthcoming bug fixes will dramatically impact PC, server and cloud services performance. According to the Intel statement on the alleged microprocessor vulnerability:

“Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed. Intel believes these exploits do not have the potential to corrupt, modify or delete data.”

However, Intel denied reports that the exploits are caused by a “bug” or a “flaw” that are unique to the company’s products. Intel said it is working with AMD, ARM Holdings and operating system vendors to “develop an industry-wide approach to resolve this issue promptly and constructively.” Intel originally planned to disclose the issue and third-party fixes next week, but made today’s statement to correct “inaccurate media reports,” the company said.

Intel Processors and Software Patches: Performance Hit?

Among Intel’s concerns: The company says bug fixes will not significantly impact user experiences and computer performance. Some reports predicted a 5 percent to 30 percent performance impact. Intel has called on customers to check in with operating system vendors and system manufacturers to “apply any available updates as soon as they are available.”

Meanwhile, MSP-centric technology companies are watching the situation closely and preparing guidance for MSPs that will need to patch customer notebooks, desktops, servers and cloud systems in the days ahead.

Datto CISO Ryan Weeks, for one, weighed in with this analysis and guidance for the company’s partners.

Return Home

No Comments

Leave a Reply

Your email address will not be published. Required fields are marked *