Intel and ARM processors are vulnerable to two exploits revealed earlier this month, see the “official” Intel release here: Intel Responds to Security Research Findings
We’ve been following the
hysteria developments closely and are deploying OS and system patches as they become available. Our initial testings of Microsoft patches on our typical business machines and Hyper-V servers revealed that the performance impact is tangible but nowhere near the 30% reported in the media. Our managed firewalls do not use x86 processors and are unaffected by the exploits, and our endpoint software has already been tested and verified post Meltdown/Spectre patching.
For further reading check out the following:
If you have questions or concerns about your machines and infrastructure don’t hesitate to get in touch.