{"id":53300,"date":"2023-08-18T14:26:49","date_gmt":"2023-08-18T14:26:49","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34922\/Companies-Respond-To-Downfall-Intel-CPU-Vulnerability.html"},"modified":"2023-08-18T14:26:49","modified_gmt":"2023-08-18T14:26:49","slug":"companies-respond-to-downfall-intel-cpu-vulnerability","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/companies-respond-to-downfall-intel-cpu-vulnerability\/","title":{"rendered":"Companies Respond To Downfall Intel CPU Vulnerability"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/03\/Intel-CPU-vPro-security.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong>Several major companies have published security advisories in response to the recently disclosed Intel CPU vulnerability named Downfall.&nbsp;<\/strong>\n<\/p>\n<p>Discovered by Google researchers and officially tracked as CVE-2022-40982, <a href=\"https:\/\/www.securityweek.com\/downfall-new-intel-cpu-attack-exposing-sensitive-information\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Downfall<\/strong><\/a> is a side-channel attack method that allows a local attacker \u2014 or a piece of malware \u2014 to obtain potentially sensitive information such as passwords and encryption keys from the targeted device.\n<\/p>\n<p>Cloud environments are also impacted and it may be possible to launch remote attacks via a web browser, but more research is needed to demonstrate such an attack.&nbsp;\n<\/p>\n<p>Intel Core and Xeon processors released over the past decade are impacted. The chip maker is releasing firmware updates, as well as mitigations, in response to the vulnerability.\n<\/p>\n<p>The flaw impacts memory optimization features in Intel processors and the attack leverages two techniques dubbed Gather Data Sampling (GDS) and Gather Value Injection (GVI).\n<\/p>\n<p>The GDS method has been described as \u201chighly practical\u201d and Google researchers created a proof-of-concept (PoC) exploit that can steal encryption keys from OpenSSL.&nbsp;\n<\/p>\n<p>Several organizations have released advisories in response to the Downfall vulnerability since its disclosure on August 8.&nbsp;<\/p>\n<div class=\"zox-post-ad-wrap\"><span class=\"zox-ad-label\">Advertisement. Scroll to continue reading.<\/span><\/div>\n<p><strong>OpenSSL<\/strong>\n<\/p>\n<p>The <a href=\"https:\/\/www.openssl.org\/blog\/blog\/2023\/08\/15\/downfall\/\" target=\"_blank\" rel=\"noreferrer noopener\">OpenSSL Project<\/a> published a blog post this week pointing out that while the Downfall attack has been demonstrated against OpenSSL, it\u2019s \u201chighly general microarchitectural side-channel attack which can compromise the security of essentially any software\u201d.\n<\/p>\n<p>\u201cBecause OpenSSL provides accelerated implementations of many cryptographic primitives using x86 SIMD instructions, if an attacker executes an attack using this vulnerability on a process performing cryptographic operations using OpenSSL, there is an elevated risk that the information they are able to extract will include cryptographic key material or plaintexts, as this material is likely to have been recently processed in the victim process using SIMD instructions. In other words, the risk to key material or other cryptographic material is particularly high,\u201d the OpenSSL Project explained.&nbsp;\n<\/p>\n<p><strong>AWS, Microsoft Azure, Google Cloud<\/strong>\n<\/p>\n<p><a href=\"https:\/\/aws.amazon.com\/security\/security-bulletins\/AWS-2023-007\/\" target=\"_blank\" rel=\"noreferrer noopener\">AWS<\/a> said its customers\u2019 data and cloud instances are not affected by Downfall and no action is required. The cloud giant did note that it has \u201cdesigned and implemented its infrastructure with protections against this class of issues\u201d.\n<\/p>\n<p><a href=\"https:\/\/learn.microsoft.com\/en-us\/answers\/questions\/1343803\/when-will-the-azure-dc*s-machines-with-sgx-get-a-f\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft<\/a> said it rolled out updates to its Azure infrastructure to patch the vulnerability. In most cases \u2014 except customers that have opted out of automatic updates \u2014 users do not need to take any action.&nbsp;\n<\/p>\n<p><a href=\"https:\/\/cloud.google.com\/support\/bulletins#gcp-2023-024\" target=\"_blank\" rel=\"noreferrer noopener\">Google Cloud<\/a> also said no customer action is required. The company has applied available patches on its server fleet. However, some products require additional updates from its partners or vendors.\n<\/p>\n<p><strong>Cisco<\/strong>\n<\/p>\n<p><a href=\"https:\/\/bst.cisco.com\/quickview\/bug\/CSCwf30460\" target=\"_blank\" rel=\"noreferrer noopener\">Cisco<\/a> said its UCS B-Series M6 blade servers and UCS C-Series M6 rack servers use Intel CPUs that are vulnerable to Downfall attacks.&nbsp;\n<\/p>\n<p><strong>Citrix<\/strong>\n<\/p>\n<p><a href=\"https:\/\/support.citrix.com\/article\/CTX569353\/citrix-hypervisor-security-bulletin-for-cve202320569-cve202334319-and-cve202240982\" target=\"_blank\" rel=\"noreferrer noopener\">Citrix<\/a> has published an advisory informing customers that \u200b\u200bCVE-2022-40982 only impacts Citrix Hypervisor when running on vulnerable Intel CPUs.\n<\/p>\n<p><strong>Dell<\/strong>\n<\/p>\n<p><a href=\"https:\/\/www.dell.com\/support\/kbdoc\/ro-ro\/000216234\/dsa-2023-180-security-update-for-intel-product-update-2023-3-advisories\" target=\"_blank\" rel=\"noreferrer noopener\">Dell<\/a> has released BIOS patches for Alienware, ChengMing, G series, Precision, Inspiron, Latitude, OptiPlex, Vostro, and XPS computers.\n<\/p>\n<p><strong>HP<\/strong>\n<\/p>\n<p><a href=\"https:\/\/support.hp.com\/ph-en\/document\/ish_9021973-9021997-16\" target=\"_blank\" rel=\"noreferrer noopener\">HP<\/a> has started releasing SoftPaqs that address Downfall for its business and consumer PCs, workstations, and retail PoS systems.&nbsp;\n<\/p>\n<p><strong>Lenovo<\/strong>\n<\/p>\n<p><a href=\"https:\/\/support.lenovo.com\/us\/en\/product_security\/LEN-134879\" target=\"_blank\" rel=\"noreferrer noopener\">Lenovo<\/a> has started releasing BIOS updates that address the vulnerability for its desktops (including all-in-one), notebooks, laptops, servers and appliances.&nbsp;&nbsp;\n<\/p>\n<p><strong>NetApp<\/strong>\n<\/p>\n<p><a href=\"https:\/\/security.netapp.com\/advisory\/ntap-20230811-0001\/\" target=\"_blank\" rel=\"noreferrer noopener\">NetApp<\/a> said multiple products incorporate Intel chips and it\u2019s working on determining which of them are impacted. To date it has confirmed that some AFF and FAS storage systems are affected, but several products are still being analyzed.\n<\/p>\n<p><strong>OVH<\/strong>\n<\/p>\n<p>The cloud giant <a href=\"https:\/\/help.ovhcloud.com\/csm\/en-dedicated-servers-downfall-vulnerability?id=kb_article_view&amp;sysparm_article=KB0059180\" target=\"_blank\" rel=\"noreferrer noopener\">OVH<\/a> has confirmed that Downfall impacts OVHcloud products. The company has summarized the steps it has taken and the actions that administrators need to conduct in response to the vulnerability.&nbsp;&nbsp;\n<\/p>\n<p><strong>SuperMicro<\/strong>\n<\/p>\n<p><a href=\"https:\/\/www.supermicro.com\/en\/support\/security_Intel_IPU2023.3_Update\" target=\"_blank\" rel=\"noreferrer noopener\">SuperMicro<\/a> released a security bulletin to inform users about recent Intel firmware patches, including for Downfall, and said it has developed a BIOS update in response to the vulnerabilities.&nbsp;\n<\/p>\n<p><strong>VMware<\/strong>\n<\/p>\n<p><a href=\"https:\/\/blogs.vmware.com\/security\/2023\/08\/cve-2022-40982.html\" target=\"_blank\" rel=\"noreferrer noopener\">VMware<\/a> informed customers that hypervisors may be affected by CVE-2022-40982 if they are using an impacted Intel CPU, but hypervisor patches are not needed to address the vulnerability. Instead, impacted customers need to obtain firmware updates from their hardware vendors.\n<\/p>\n<p><strong>Xen<\/strong>\n<\/p>\n<p><a href=\"https:\/\/xenbits.xen.org\/xsa\/advisory-435.html\" target=\"_blank\" rel=\"noreferrer noopener\">Xen<\/a> said all versions of its hypervisor are affected if running on devices with vulnerable Intel CPUs. In addition to recommending firmware updates from hardware vendors, the organization has provided mitigations, but warned that they could significantly impact performance.&nbsp;\n<\/p>\n<p><strong>Linux distributions<\/strong>\n<\/p>\n<p>Several Linux distributions have released advisories, patches and mitigations for systems using Intel processors. The list includes <a href=\"https:\/\/www.suse.com\/security\/cve\/CVE-2022-40982.html\" target=\"_blank\" rel=\"noreferrer noopener\">SUSE<\/a>, <a href=\"https:\/\/blog.cloudlinux.com\/securing-your-cloudlinux-server-mitigating-new-intel-and-amd-cpu-vulnerabilities\" target=\"_blank\" rel=\"noreferrer noopener\">CloudLinux<\/a>, <a href=\"https:\/\/access.redhat.com\/security\/cve\/cve-2022-40982\" target=\"_blank\" rel=\"noreferrer noopener\">RedHat<\/a>, <a href=\"https:\/\/ubuntu.com\/security\/CVE-2022-40982\" target=\"_blank\" rel=\"noreferrer noopener\">Ubuntu<\/a> and <a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2022-40982\" target=\"_blank\" rel=\"noreferrer noopener\">Debian<\/a>.\n<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34922\/Companies-Respond-To-Downfall-Intel-CPU-Vulnerability.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":53301,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8914],"class_list":["post-53300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinedata-lossflawintel"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Companies Respond To Downfall Intel CPU Vulnerability 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/companies-respond-to-downfall-intel-cpu-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Companies Respond To Downfall Intel CPU Vulnerability 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/companies-respond-to-downfall-intel-cpu-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-18T14:26:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/03\/Intel-CPU-vPro-security.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-respond-to-downfall-intel-cpu-vulnerability\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-respond-to-downfall-intel-cpu-vulnerability\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Companies Respond To Downfall Intel CPU Vulnerability\",\"datePublished\":\"2023-08-18T14:26:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-respond-to-downfall-intel-cpu-vulnerability\\\/\"},\"wordCount\":756,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-respond-to-downfall-intel-cpu-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/companies-respond-to-downfall-intel-cpu-vulnerability.jpg\",\"keywords\":[\"headline,data loss,flaw,intel\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-respond-to-downfall-intel-cpu-vulnerability\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-respond-to-downfall-intel-cpu-vulnerability\\\/\",\"name\":\"Companies Respond To Downfall Intel CPU Vulnerability 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-respond-to-downfall-intel-cpu-vulnerability\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-respond-to-downfall-intel-cpu-vulnerability\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/companies-respond-to-downfall-intel-cpu-vulnerability.jpg\",\"datePublished\":\"2023-08-18T14:26:49+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-respond-to-downfall-intel-cpu-vulnerability\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-respond-to-downfall-intel-cpu-vulnerability\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-respond-to-downfall-intel-cpu-vulnerability\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/companies-respond-to-downfall-intel-cpu-vulnerability.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/companies-respond-to-downfall-intel-cpu-vulnerability.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/companies-respond-to-downfall-intel-cpu-vulnerability\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,data loss,flaw,intel\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinedata-lossflawintel\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Companies Respond To Downfall Intel CPU Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Companies Respond To Downfall Intel CPU Vulnerability 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/companies-respond-to-downfall-intel-cpu-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Companies Respond To Downfall Intel CPU Vulnerability 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/companies-respond-to-downfall-intel-cpu-vulnerability\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-08-18T14:26:49+00:00","og_image":[{"url":"https:\/\/www.securityweek.com\/wp-content\/uploads\/2023\/03\/Intel-CPU-vPro-security.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/companies-respond-to-downfall-intel-cpu-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-respond-to-downfall-intel-cpu-vulnerability\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Companies Respond To Downfall Intel CPU Vulnerability","datePublished":"2023-08-18T14:26:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-respond-to-downfall-intel-cpu-vulnerability\/"},"wordCount":756,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-respond-to-downfall-intel-cpu-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/companies-respond-to-downfall-intel-cpu-vulnerability.jpg","keywords":["headline,data loss,flaw,intel"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/companies-respond-to-downfall-intel-cpu-vulnerability\/","url":"https:\/\/www.threatshub.org\/blog\/companies-respond-to-downfall-intel-cpu-vulnerability\/","name":"Companies Respond To Downfall Intel CPU Vulnerability 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-respond-to-downfall-intel-cpu-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-respond-to-downfall-intel-cpu-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/companies-respond-to-downfall-intel-cpu-vulnerability.jpg","datePublished":"2023-08-18T14:26:49+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/companies-respond-to-downfall-intel-cpu-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/companies-respond-to-downfall-intel-cpu-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/companies-respond-to-downfall-intel-cpu-vulnerability\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/companies-respond-to-downfall-intel-cpu-vulnerability.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2023\/08\/companies-respond-to-downfall-intel-cpu-vulnerability.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/companies-respond-to-downfall-intel-cpu-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,data loss,flaw,intel","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinedata-lossflawintel\/"},{"@type":"ListItem","position":3,"name":"Companies Respond To Downfall Intel CPU Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=53300"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/53300\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/53301"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=53300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=53300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=53300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}