Thursday, May 15, 2025
HomeSecurity NewsIntel asks customers to hold off Applying Patches for Spectre and Meltdown

Intel asks customers to hold off Applying Patches for Spectre and Meltdown

Published on

SIEM as a Service

Follow Us on Google News

Intel initially released patches for Spectre and Meltdown on Jan. 15 which covers 90% of the modern CPUs, but it results in higher system reboots after applying firmware updates. Most affected ones are the systems running Intel Broadwell and Haswell CPUs for both client and data center.

Intel told now they have identified the root cause of the reboot issue that affected Broadwell and Haswell CPUs and they are preparing a solution to address the issue and asks to hold off applying patches for Spectre and Meltdown.

Over the weekend, we began rolling out an early version of the updated solution to industry partners for testing, and we will make a final release available once that testing has been completed.

- Advertisement - Google News

Also Read Nearly Every CPU’s Since 1995 are Vulnerable to “Meltdown” and “Spectre” Attacks

Intel Statement – Patches for Spectre and Meltdown

Intel says We recommend that OEMs, cloud service providers, system manufacturers, 
software vendors and end users stop deployment of current versions, as they may 
introduce higher than expected reboots and other unpredictable system behavior.

We also ask that our industry partners focus efforts on testing early versions of 
the updated solution for Broadwell and Haswell we started rolling out this weekend.
so we can accelerate its release. We expect to share more details on timing later
this week.

For those concerned about system stability, while we finalize the updated
solutions, we are also working with our OEM partners on the option to utilize
 a previous version of microcode that does not display these issues but removes 
the Variant 2 (Spectre) mitigations. This would be delivered via a BIOS update, 
and would not impact mitigations for Variant 1 (Spectre) and Variant 3 (Meltdown).

CVE-2017-5753 and CVE-2017-5715 are the references to Spectre, CVE-2017-5754 is for Meltdown.Crooks trying to take advantage of the infamous Meltdown and Spectre bug and pushing malware with fake patches.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Leverage Weaponized HTML Files to Deliver Horabot Malware

A recent discovery by FortiGuard Labs has unveiled a cunning phishing campaign orchestrated by...

TA406 Hackers Target Government Entities to Steal Login Credentials

The North Korean state-sponsored threat actor TA406, also tracked as Opal Sleet and Konni,...

Google Threat Intelligence Releases Actionable Threat Hunting Technique for Malicious .desktop Files

Google Threat Intelligence has unveiled a series of sophisticated threat hunting techniques to detect...

New Adobe Photoshop Vulnerability Enables Arbitrary Code Execution

Adobe has released critical security updates addressing three high-severity vulnerabilities (CVE-2025-30324, CVE-2025-30325, CVE-2025-30326) in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Phishing Campaign Uses Blob URLs to Bypass Email Security and Avoid Detection

Cybersecurity researchers at Cofense Intelligence have identified a sophisticated phishing tactic leveraging Blob URIs...

UK Government to Shift Away from Passwords in New Security Move

UK government has unveiled plans to implement passkey technology across its digital services later...

New Spam Campaign Leverages Remote Monitoring Tools to Exploit Organizations

A sophisticated spam campaign targeting Portuguese-speaking users in Brazil has been uncovered by Cisco...