Intel's Meltdown and Spectre patches cause reboots and hurt performance
The company is working on a fix, but recommends people check out Google's Retpoline solution in the meantime
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
You are now subscribed
Your newsletter sign-up was successful
Intel has accepted that its fix to the Spectre and Meltdown vulnerabilities are having an impact on performance of PCs, particularly that it's causing more reboots and slowing devices down.
The company's Data Centre boss said it has now issued updates to 90% of Intel CPUs that have been purchased in the last five years, but it's now working on fixing the problems the update has caused. Although it has fixed the vulnerabilities, securing Intel chip-powered devices from hackers, it has caused knock-on effects across the board.
"We have determined that similar behavior occurs on other products in some configurations, including Ivy Bridge-, Sandy Bridge-, Skylake-, and Kaby Lake-based platforms," Navin Shenoy said. "We have reproduced these issues internally and are making progress toward identifying the root cause. In parallel, we will be providing beta microcode to vendors for validation by next week."
The company tested the performance of devices running its processors - both on the client and data centre sides. The tests on its data centre systems do show a significant impact that changes according to the specific workloads and configurations a client has set up.
For example, systems running integer and floating point throughput, Linpack, STREAM, server-side Java and energy efficiency benchmarks have been affected by 0-2%, while online transaction processing benchmarks show a performance reduction of 4%.
I/O applications were harder to measure because of their range of variants. Stress testing the CPU in a 100% write resulted in an 18% performance reduction, but splitting that out to 70/30 read/write model, there was only a 2% reduction.
"In those areas where we are seeing higher impacts, we are working hard with our partners and customers to identify ways to address this," Shenoy added. "For example, there are other mitigations options that could yield less impact. More details on some of these options can be found in our white paper and in Google's post on their 'Retpoline' security solution."
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives

Clare is the founder of Blue Cactus Digital, a digital marketing company that helps ethical and sustainability-focused businesses grow their customer base.
Prior to becoming a marketer, Clare was a journalist, working at a range of mobile device-focused outlets including Know Your Mobile before moving into freelance life.
As a freelance writer, she drew on her expertise in mobility to write features and guides for ITPro, as well as regularly writing news stories on a wide range of topics.
-
Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerabilityNews Threat actors have been exploiting the vulnerability to achieve root access since 2023
-
Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourselfNews The VS Code vulnerabilities highlight broader IDE security risks, said OX Security
-
CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaughtNews While the CVE figures might be daunting, they won't all be relevant to your organization
-
Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to knowNews Patch Tuesday update targets large number of vulnerabilities already being used by attackers
-
Experts welcome EU-led alternative to MITRE's vulnerability tracking schemeNews The EU-led framework will reduce reliance on US-based MITRE vulnerability reporting database
-
Veeam patches Backup & Replication vulnerabilities, urges users to updateNews The vulnerabilities affect Veeam Backup & Replication 13.0.1.180 and all earlier version 13 builds – but not previous versions.
-
Two Fortinet vulnerabilities are being exploited in the wild – patch nowNews Arctic Wolf and Rapid7 said security teams should act immediately to mitigate the Fortinet vulnerabilities
-
Everything you need to know about Google and Apple’s emergency zero-day patchesNews A serious zero-day bug was spotted in Chrome systems that impacts Apple users too, forcing both companies to issue emergency patches

