On January 5, according to a report from VentureBeat, Intel recently acknowledged that insecure memory leaks could affect millions of its processors. In response, ARM has now confirmed that several Cortex series processors also contain similar vulnerabilities. The Cortex architecture is widely used across various platforms, including Android and iOS devices, as well as products from companies like Nvidia, Qualcomm, and Sony.
ARM recently disclosed four distinct processor vulnerabilities, and their official chart confirmed that multiple Cortex chips, such as the A8, A9, A15, A17, A57, A72, A73, and A75, are affected by more than two security flaws. These older processors were commonly found in early Apple devices, including the first three iPad models, original iPad mini, iPhone 4/4s/5/5c, iPod touch 4G/5G, and Apple TV 2G/3G. They were also present in some Google-branded phones and earlier Qualcomm Snapdragon-powered devices.
Given the widespread licensing of ARM Cortex technology, the impact on customized chips varies depending on the manufacturer. As a result, compiling a full list of affected devices is nearly impossible. However, it's clear that the Cortex-A8, -A9, and -A15 are still in use in many legacy systems. For example, these cores appear in Nvidia’s Tegra 2, 3, 4, and K1 chips, as well as Samsung’s Exynos 3110, 4, and 5 series. It remains unclear whether Apple’s custom A-series chips or later internally developed processors have avoided these vulnerabilities.
To protect ARM-based devices, users must rely on specific patches provided by their operating system vendors. ARM has advised Android users and others to check with their device manufacturers for updates, while offering software mitigations for Linux. Google has already released patches for Android, but many other devices are still waiting for vendor-specific fixes. Apple has not yet publicly addressed which devices are affected, nor has it shared a detailed solution. If iOS devices are impacted, Apple may roll out patches via software updates, though the performance impact is still unknown.
Intel CEO Brian Krzanich noted that the vulnerability affects a wide range of products, though the extent of the impact varies. Mobile devices, personal computers, and servers may all be affected to different degrees. ARM emphasized that the risk of exploitation is relatively low, as these attacks require local malware execution. Therefore, users should keep their software updated, avoid suspicious links, and stay cautious about downloading untrusted applications. (small)
HP Fortis X360 11 G5 Chromebook
HP Fortis X360 11 G5; HP Fortis X360 G5 keyboard; HP Fortis X360; HP Fortis X360 11 G5 LCD cover
S-yuan Electronic Technology Limited , https://www.syuanelectronic.com