Intel processor recently exposed a major information security vulnerability. According to the latest report by The Wall Street Journal, Intel did not immediately notify the U.S. government while notifying other parties of the flaws. According to the report, Intel told the processors that there are information security vulnerabilities, including Specter and Meltdown, who told a number of customers that the U.S. government is not included in the notification list.
Some of the technology companies in China that received notice from Intel also have no proof that they have been abused. An Intel spokesman responded that the company was unable to notify all parties as planned due to early disclosure of the news.
The problem now is that before the vulnerability was announced, Intel did not prepare for a certain amount of advance in the U.S. government.
An Intel spokesman said: “The Google Project Zero team and affected suppliers, including Intel, follow a code of conduct that is responsible for, and in concert with, best practices.” The first disclosures, standards, and practices that have been established are in collaboration with industry participants and announced in the media Before the solution was developed and deployed, however, vulnerability information was exposed earlier than industry organizations plan to publicly disclose, and Intel planned to come into contact with the U.S. government and other agencies at this point in time.”
Intel eventually had to rush to deal with the news. As planned, Intel will notify major customers and other interested parties to develop patches as soon as possible before the disclosure of the vulnerability. The Meltdown and Specter vulnerabilities are particularly dangerous as these vulnerabilities theoretically affect all computer users and the end result is launching a massive clean-up effort at all companies to ensure everyone is up and running.