Computer chips of billions of devices have discovered a vulnerability that could allow attackers to gain access to sensitive data. Researchers demonstrated that it was possible to gain access to, for example, passwords, crypto keys or information from programs. The tech companies are in the process of plugging the gap with software updates.
The vulnerability lies in a process whereby chips may retrieve information needed later in advance to avoid delays. This technique known as "speculative execution" has been used by various providers for years. This would probably threaten a mass of computer equipment, at least in theory.
They do not know whether the vulnerability has already been exploited, the researchers said. You probably would not be able to find it because the attacks left no traces in traditional log files.