Skip to main content
Penn Information Systems & Computing Systems Home

Search form

Getting system status
  • Get Started
    • IT Staff
    • Faculty
    • Staff
    • Students
    • Alumni & Guests
    • ISC Staff
  • Services
    • — Services A to Z —
    • Accounts, Access & Security
      • Access Management Services
      • Active Directory
      • Identity Management Services
      • Information Security Services
    • Applications & Data Analytics
      • Application Development & Delivery
      • Data Analytics
        • Data Analytics at Penn
      • Integration Development & Delivery
    • Backup, Storage & Platforms
      • BackItUp
      • Cloud Solutions
      • Data Center & Colocation Solutions
      • Database & Application Platform Support & Consulting
      • Endpoint Management
      • Recovery Solutions
      • Storage
      • Virtual Desktop
      • Virtual Server Hosting
    • Community, Support & Learning
      • Classroom Technology Services
      • Desktop Engineering
      • IT Community Events
      • LinkedIn Learning
      • Tech Center
    • Consulting & Professional Services
      • Brokered Products
      • HireIT
      • Systems Support & Consulting
      • Technology Forecasting
    • Email, Calendaring & Collaboration
      • Classlists
      • Penn Email Routing
      • PennBox
      • PennNet Mailing Lists
      • PennO365
      • PennZoom
      • SMTP-Relay
      • Secure Share
    • Networks & Connectivity
      • Firewall Services
      • Network Design & Installation
      • PennNet
        • Network Names & Numbers
        • MAGPI (Penn's Internet2 Regional Optical Network)
      • PennNet Ethernet Ports
      • Wireless at Penn
    • Phone, TV & Video
      • Contact Center
      • Live Video Streaming
      • Penn Video Network
      • PennFlex Phone
      • Traditional Telephony
      • Video Content Management
      • Video Production
        • Producing Video Content
    • Web Hosting
      • Web Hosting Service
    • — Service Rates —
    • — Service Level Agreements —
  • Security
    • Office of Information Security
    • Security Services
    • Special Projects
    • Policies & Procedures
    • Training & Awareness
    • Penn SecureIT program
  • Collaborations
    • Computing Policies
    • Engaging Penn’s IT Community
    • Identity & Access Management
    • Penn IT Strategic Plan
    • Cloud First
    • Next Generation Unified Communications
    • Penn Bot
    • IT Advisory Groups
      • Common Solutions
      • IT Roundtable
      • Network Policy Committee
      • Penn Technology Investment Committee (PTIC)
        • About PTIC
        • The PTIC IT Development Fund
    • Special Interest Groups (SIGs)
      • Audio-Visual (AV-SIG)
      • Cloud Computing (Cloud-SIG)
      • Data Visualization (DataViz-SIG)
      • Developer SIG (Dev-SIG)
      • High-Performance Computing (HPC-SIG)
      • Instructional Technology SIG
      • Linux SIG
      • Macintosh Networking Group (MacNet)
      • Mobile Technologies (Mobile-SIG)
      • O365 Special Interest Group
      • PC Networking Group (PC-Net)
      • Project Partners SIG
      • Security SIG
      • Social Media SIG
      • Splunk Special Interest Group
      • Super User Group (SUG)
      • Web SIG
    • Technology Services Strategy Review Board
  • News
  • About
  • Hot Topics
  • Get IT Help

You are here

Home » Meltdown and Spectre security vulnerabilities

Meltdown and Spectre security vulnerabilities

As you may be aware, computer security researchers recently discovered several flaws in the microprocessors of nearly all modern computers (including cell phones, tablets, etc.).  This has led to two new vulnerabilities, called Meltdown & Spectre.  If exploited, these vulnerabilities can result in the unauthorized disclosure of data being processed by - or stored in - your computer’s memory (e.g., passwords, personally identifiable information, etc.). 

Penn is taking a number of steps to ensure that University systems and software are patched as soon as possible, that resources are available to assist you with questions or concerns, and to monitor for changes in the threat level.  Where possible, we will also monitor for and block attacks at the campus firewall. Please direct any questions related to Meltdown and Spectre to ISC Information Security Office at (215) 898-2172 or security@isc.upenn.edu.

Quick Summary

  1. Keep all systems and applications patched (including mobile and personal devices).
  2. Talk to your local IT support providers (https://www.isc.upenn.edu/get-it-help).
  3. Don’t panic and please stay tuned. At the time of this writing, there is no evidence of active exploitation of these vulnerabilities, but this situation continues to evolve.

Detailed information on Meltdown and Spectre is provided in the following sections with additional resources listed on this webpage right-hand banner. 

What is the problem?

The discovery of several flaws in computer processors have led to two new vulnerabilities, Meltdown & Spectre.  These vulnerabilities can result in the unauthorized disclosure of data being processed by, or stored in, your computer’s memory (e.g., passwords, personally identifiable information, etc.).

What is the scope of the problem?

Meltdown and Spectre affect processors from a variety of manufacturers (Meltdown primarily affecting Intel chips and Spectre affecting Intel, AMD and ARM).  Almost every modern computing device (including phones, tablets, gaming systems, etc.) uses one of these processors, so the scope of impact is broad. 

Can it be fixed?

The complete way to fix this problem in the future will be to either replace the processor or upgrade its code. Both of those actions are likely to be difficult and/or expensive.   As a stop-gap measure, software patches for common operating systems (Windows, Mac, Linux, etc.) and applications (MS SQL, Oracle, etc.) are being released and can help mitigate the vulnerability.

So, are we good?

There are still a number of outstanding concerns:

  • The software patches may negatively impact some systems (i.e., up to 30% decrease in performance) worse than others.
  • Not all applications may be patched by vendors.  Not all applications or operating systems may have patches released in a timely fashion (e.g., before exploits begin occurring in the wild).   
  • The software patches are a work-around, not a final fix, so may need further updating later. 

For these reasons, this is an evolving, and likely to be long-standing, problem that will not be fully or easily remediated in the short term. However, it can be greatly mitigated through diligent response and monitoring, so please stay tuned to the issue.

What should I do?
  • Work with your local IT support provider to ensure that you have minimized the risk by applying all software updates (both operating system and application) provided by the manufacturer.  If you are unsure who your support provider is or how to reach them, please visit: https://www.isc.upenn.edu/get-it-help.  
  • Don’t panic and stay tuned.  This is an evolving issue.
What is Penn doing?
  • Central/ISC systems are being patched as soon as patches become available at the earliest, and in accordance with normal planned patching schedules (weekly, monthly) at the latest.  If exploits are known to be occurring, all available patching will be expedited.
  • ISC is working closely with supported hardware and software vendors to understand risks particular to different platforms and the most expedient mitigation paths available.
  • In addition to the support from local IT staff, ISC will also work with Penn’s IT community to schedule custom ‘office hours’ sessions on this topic at the “Tech Center” in G-102 in the Van Pelt Library if needed.
  • Information Security is working with Schools and Centers to evaluate risk, monitoring all channels for news, information and/or evidence of the vulnerability being exploited in the wild, and alert the community as updates occur.  (Currently there has been no active exploitation reported).
  • When/where possible, we are monitoring and blocking for attacks attempting to exploit either of these vulnerabilities at the campus firewall.  (There are currently only a few rules available at this time, although we expect there to be more later).

Visit ISC on LinkedIn

Print
InfoSec Home
Resources
  • Meltdown and Spectre vulnerabilities in modern computers
  • SonicWall: Meltdown and Spectre - The Intel chip vulnerability
  • Microsoft: Protecting your device ...
  • Meltdown, Spectre: The password theft bugs at the heart of Intel CPUs
Contact InfoSec
  • Computing Policies
  • Tech Jobs @ Penn

© 2025 THE UNIVERSITY OF PENNSYLVANIA — 3401 Walnut Street, Philadelphia, PA 19104 — Report accessibility issues and get help — For ISC Staff