Intel, AMD and ARM CPUs hit by new Spectre vulnerability
Don't panic!
Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.
You are now subscribed
Your newsletter sign-up was successful
Want to add more newsletters?
Every Friday
GamesRadar+
Your weekly update on everything you could ever want to know about the games you already love, games we know you're going to love in the near future, and tales from the communities that surround them.
Every Thursday
GTA 6 O'clock
Our special GTA 6 newsletter, with breaking news, insider info, and rumor analysis from the award-winning GTA 6 O'clock experts.
Every Friday
Knowledge
From the creators of Edge: A weekly videogame industry newsletter with analysis from expert writers, guidance from professionals, and insight into what's on the horizon.
Every Thursday
The Setup
Hardware nerds unite, sign up to our free tech newsletter for a weekly digest of the hottest new tech, the latest gadgets on the test bench, and much more.
Every Wednesday
Switch 2 Spotlight
Sign up to our new Switch 2 newsletter, where we bring you the latest talking points on Nintendo's new console each week, bring you up to date on the news, and recommend what games to play.
Every Saturday
The Watchlist
Subscribe for a weekly digest of the movie and TV news that matters, direct to your inbox. From first-look trailers, interviews, reviews and explainers, we've got you covered.
Once a month
SFX
Get sneak previews, exclusive competitions and details of special events each month!
A few days ago, Intel and ARM chips were found to be affected by a new Spectre vulnerability. Dubbed Spectre V2, AMD processors were thought to avoid the issue but new research shows that AMDs mitigation efforts to be inadequate.
The team of researchers from the Vrije Universiteit Amsterdam (via Tom's Hardware) in the Netherlands demonstrated a new Spectre attack that bypasses hardware mitigations put in place by Intel and ARM over the last few years. AMD was thought to be immune, or at least not significantly impacted but Intel have since revealed that AMD's chipset can present vulnerabilities. Since then, AMD released a security notice that confirms its vulnerability.
Spectre is a security vulnerability that affects modern microprocessors that perform speculative branch prediction. A side effect of this is the possibility of revealing data to attackers. Though Spectre itself dates back to 2017, similar vulnerabilities have been present for many years.
Beginning in 2018 security measures were put into place including OS updates, BIOS microcode mitigations and eventually, hardware fixes. However it looks like these measures weren't enough to prevent further exploits.
How to buy a graphics card: tips on buying a graphics card in the barren silicon landscape that is 2022
“The mitigations [implemented by Intel and Arm] work as intended, but the residual attack surface is much more significant than vendors originally assumed,” the researchers explained.
While end users are unlikely to fall victim to a Spectre attack, its still advisable to install the various protection updates as they become available, even if they can lead to a loss of performance. Luckily, many apps can be coded with little if any performance penalty, but code run via a web browser should be run with mitigations in place.
So, while news of new vulnerabilities are unwelcome, it’s important not to panic. It’s believed that these risks are rarely, if ever exploited. Malicious actors use easier methods to get what they want so as long as you keep your system up to date, there’s little, if anything to worry about.
Keep up to date with the most important stories and the best deals, as picked by the PC Gamer team.

Chris' gaming experiences go back to the mid-nineties when he conned his parents into buying an 'educational PC' that was conveniently overpowered to play Doom and Tie Fighter. He developed a love of extreme overclocking that destroyed his savings despite the cheaper hardware on offer via his job at a PC store. To afford more LN2 he began moonlighting as a reviewer for VR-Zone before jumping the fence to work for MSI Australia. Since then, he's gone back to journalism, enthusiastically reviewing the latest and greatest components for PC & Tech Authority, PC Powerplay and currently Australian Personal Computer magazine and PC Gamer. Chris still puts far too many hours into Borderlands 3, always striving to become a more efficient killer.

