CyberGlossary

Vulnerabilities

Meltdown

Also known as: Rogue Data Cache Load

Definition

A microarchitectural vulnerability (CVE-2017-5754) that lets unprivileged code read kernel memory by exploiting out-of-order execution and a delayed permission check.

Disclosed alongside Spectre in January 2018, Meltdown affected most Intel and some ARM CPUs. The flaw is that a load instruction that violates page-level permissions still propagates its data into transient operations before the fault is raised, allowing dependent loads to leave cache footprints that reveal the protected byte. A user-mode process could therefore dump the entire kernel address space at megabytes per second. Mitigation came primarily through Kernel Page-Table Isolation (KPTI/KAISER) at OS level, plus microcode updates and silicon redesign in later CPUs. Meltdown is largely fixed by modern hardware and patched kernels, but underscored how invisible architectural assumptions can produce catastrophic security failures.

Examples

  • Proof-of-concept that prints /etc/shadow from an unprivileged process on a vulnerable Intel CPU.
  • Cloud KPTI rollout in early 2018 to mitigate cross-tenant kernel reads.

Related terms