Meltdown & Spectre CVE-2017-5715/-5753/-5754
Our systems are not affected!
Modern CPU have been strictly optimized to performance. One of the used best practice method is loading of speculative data area on decisions for faster processing in case of positive events. With a lot of tricks an extensive methods it has succeeded to get unauthorised memory access despite it´s immunisation, so that bigger memory areas from other processes can be read out to search for sensible information. These methods have been named Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5715/-5753)
Affected are more or less all processors in PC, smartphones, routers and other modern devices. Besides Intel, AMD and ARM are demanded to close this gap.. But a real remedy is only possible with exchange of the processor. But ways have found to at least mitigate the impacts by software patches in the Operating Systems such as Windows and Linux, which might lead to a loss of performance up to 30 %.
The good news:
- Due to technical design the processors of series5 and series5+ are not affected
- An unauthorized accesses may only be performed by an unwanted machine code on a local processor. An access via network is not executable. In our systems only signed programms on the basis of a strict examination from our house are allowed. That's why an exploit is prevented
- The physical architecture of the series5e CPU potentially may be affected by Spectre but as declared above, an attempt to our point of view is not feasible.
We strictly recommend to follow the advices in our Checklist for IT-Security.
Additional information to MELTDOWN & SPECTRE
The bug officially was noticed as CVE 2017-5715, CVE 2017-5753 and CVE 2017-5754. Additional information may be found here: