High Severity

Potential CPU Security Issue

Share this post:

On Wednesday, January 3, researchers announced a security vulnerability impacting microprocessors.  IBM is working with our clients and industry partners on this issue, which has the potential to affect many types of computing devices from different manufacturers. It’s important to note there are no known cases where this vulnerability has been used maliciously.

Patches will be made available for IBM systems via our normal customer portals. Further details concerning potentially impacted processors in the POWER family can be found here.  Per our business as usual process, all information for IBM Z clients can be found at the IBM Z Portal.

IBM Storage appliances are not impacted by this vulnerability.  For Storage, further details concerning this vulnerability can be found here.

Additional information will be provided through normal IBM communications channels, including IBM Security Bulletins. Please actively monitor both your IBM Support Portal and the IBM PSIRT Blog.

The most immediate action clients can take to protect themselves is to prevent execution of unauthorized software on any system that handles sensitive data, including adjacent virtual machines.

We will continue to update this blog to include additional information as appropriate.

More High Severity stories

Security Bulletin: Buffer overflow vulnerability affecting certain Aspera applications

Mar 31, 2020 2:20 pm EDT | High Severity

IBM Aspera has discovered a security vulnerability that requires your immediate attention. Certain Aspera applications (details below) are vulnerable to a buffer overflow, which could allow an attacker with intimate knowledge of the system to execute commands in a restricted shell. Aspera strongly recommends that the patch be applied to systems running the latest release of your product in order to ensure that you have all of the latest enhancements and security patches that have been provided with previous releases. The patch binary will, however, work with prior releases for live patches. ...read more