Meanwhile, the impact of the bug is already quite clear: programs exploiting the vulnerability therefore have the ability to extract content from the processor they should not have access to. In this way, all kinds of sensitive data could be intercepted – including, for example, passwords.
The solution to the existing problem is complex, requiring a complete overhaul of the way programs communicate with the processor. This is accompanied by a slowdown of the processors, which can not be foreseen yet. Losses in the range of 5 to 30 percent are so far the speech. Depending on the application, this value varies.