Meltdown and Spectre are hardware vulnerabilities in modern CPUs that exploit speculative execution and out-of-order processing to break memory isolation between applications and operating systems, leaking privileged data across security boundaries.
Attackers trigger speculative execution paths that access protected memory, then use side-channel timing measurements like cache timing analysis to infer and extract sensitive data that processors should keep isolated and inaccessible.
These exploits undermine hardware-enforced isolation, allowing unauthorized programs to read passwords, encryption keys, and confidential information across running processes, virtual machines, and cloud environments without triggering traditional security defenses.
Source
Get our entire attack repository in a single, offline-ready PDF guide, featuring 25+ real-world attacks.
See how organizations gained 442% ROI and major efficiency improvements with Endpoint Central.
Read moreDiscover how Endpoint Central’s antivirus earned recognition through rigorous, real-world security validation in just eight months.
Read moreGet a clear, practical guide to understanding threats and strengthening your organization’s security.
Read more