{"id":98680,"date":"2023-08-18T20:30:00","date_gmt":"2023-08-19T03:30:00","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=98680"},"modified":"2023-10-27T14:08:52","modified_gmt":"2023-10-27T21:08:52","slug":"does-the-downfall-vulnerability-affect-intel-macs","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/","title":{"rendered":"Does the Downfall vulnerability affect Intel Macs?"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-98683\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/08\/Downfall-vulnerability-Intel-iMac-falling-down-600x300-1.jpg\" alt=\"\" width=\"800\" height=\"400\" \/><\/p>\n<p>Back in January 2018, news of the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/\">Spectre and Meltdown vulnerabilities<\/a> took the world by surprise. Several independent research groups began publishing details about the speculative execution vulnerabilities. The flaws affected various processor architectures, most notably Intel, but also AMD, and even ARM-based processors like those found in iPhones and iPads. (Today&#8217;s Apple silicon-based Macs with M1 and M2 processors are also ARM-based.)<\/p>\n<p>As we noted at the time, the world was just beginning to understand speculative execution flaws; it was only a matter of time before the discovery of similar flaws of this nature. Sure enough, more have been discovered since then, including <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-spoiler-attack-puts-intel-processors-at-risk\/\">SPOILER<\/a>, though few have directly impacted Macs.<\/p>\n<p>On August 9, 2023, researcher Daniel Moghimi spoke at the Black Hat USA 2023 conference and shared details about a new speculative execution vulnerability: <a href=\"https:\/\/downfall.page\/\" target=\"_blank\" rel=\"noopener\">Downfall<\/a> (CVE-2022-40982). Moghimi reported the vulnerability to Intel nearly one year ago, in August 2022, and kept the details under embargo until now.<\/p>\n<p>Here&#8217;s what Mac users should know about this vulnerability.<\/p>\n<p><em>In this article:<\/em><\/p>\n<ul>\n<li><a href=\"#attackerdo\">What can an attacker do by exploiting Downfall?<\/a><\/li>\n<li><a href=\"#aremacsaff\">Is there a fix available? Are Macs affected?<\/a><\/li>\n<li><a href=\"#whichmacsaff\">Which Macs are potentially affected?<\/a><\/li>\n<li><a href=\"#whichmacsfix\">If Apple releases updates, which Macs will likely get fixed?<\/a><\/li>\n<li><a href=\"#learnmore\">How can I learn more?<\/a><a name=\"attackerdo\"><\/a><\/li>\n<\/ul>\n<h3>What can an attacker do by exploiting Downfall?<\/h3>\n<p>By exploiting Downfall, attackers can read data in the computer&#8217;s memory that &#8220;should not normally be accessible.&#8221; According to Moghimi:<\/p>\n<blockquote><p>&#8220;A hacker can target high-value credentials such as passwords and encryption keys. Recovering such credentials can lead to other attacks that violate the availability and integrity of computers in addition to confidentiality.&#8221;<\/p><\/blockquote>\n<p>Moghimi says that such attacks are &#8220;highly practical.&#8221; In just two weeks, he was able to create &#8220;an end-to-end attack stealing encryption keys from OpenSSL.&#8221;<\/p>\n<p>What&#8217;s worse, Moghimi says that it&#8217;s theoretically possible for an attacker-controlled Web page to remotely exploit the vulnerability on a victim&#8217;s computer.<\/p>\n<p>In other words, proper exploitation of Downfall can cause some serious havoc; one shouldn&#8217;t take it lightly.<a name=\"aremacsaff\"><\/a><\/p>\n<h3>Is there a fix available? Are Macs affected?<\/h3>\n<p>Intel has released microcode updates for affected processors. Dell, Lenovo, and other manufacturers have begun to release BIOS updates for affected PCs.<\/p>\n<p>But Apple\u2014which sold potentially affected Intel-based Macs from 2015 through 2023\u2014has not yet confirmed whether Macs are directly impacted. Moghimi doesn&#8217;t speculate about this; rather, he links to a <a href=\"https:\/\/www.macworld.com\/article\/2026071\/intel-downfall-vulnerability-skylake-macs-mitigation.html\" target=\"_blank\" rel=\"noopener nofollow\">Macworld article<\/a> that does the speculation for him. Macworld, for its part, reached out to Apple, but the company has not yet responded. Intego has also contacted Apple but has not received a response yet; we&#8217;ll update this article if Apple replies.<\/p>\n<p>So, at this point, it&#8217;s not entirely clear whether Downfall directly affects Intel-based Macs. We may never know unless Apple confirms it and releases patches. (More on that later.)<a name=\"whichmacsaff\"><\/a><\/p>\n<h3>Which Macs are potentially affected?<\/h3>\n<p>Based on the information that has been made available so far, it&#8217;s possible that the following Macs could potentially be impacted by the Downfall vulnerability:<\/p>\n<ul>\n<li><strong>iMac (Retina 5K, 27-inch)<\/strong>\n<ul>\n<li>Models: Late 2015, 2017, 2019, 2020<\/li>\n<li>Sold new from Oct 2015\u2013Mar 2022<\/li>\n<\/ul>\n<\/li>\n<li><strong>iMac (21.5-inch, 2017)<\/strong> \u2014 sold new from Jun 2017\u2013Oct 2021<\/li>\n<li><strong>iMac (Retina 4K, 21.5-inch)<\/strong>\n<ul>\n<li>Models: 2017, 2019<\/li>\n<li>Sold new from Jun 2017\u2013Apr 2021<\/li>\n<\/ul>\n<\/li>\n<li><strong>iMac Pro (2017)<\/strong> \u2014 sold new from Dec 2017\u2013Mar 2021<\/li>\n<li><strong>Mac mini (2018)<\/strong> \u2014 sold new from Oct 2018\u2013Jan 2023<\/li>\n<li><strong>Mac Pro (2019)<\/strong> \u2014 sold new from Dec 2019\u2013Jun 2023<\/li>\n<li><strong>MacBook (Retina, 12-inch)<\/strong>\n<ul>\n<li>Models: Early 2016, 2017<\/li>\n<li>Sold new from Apr 2016\u2013Jul 2019<\/li>\n<\/ul>\n<\/li>\n<li><strong>MacBook Air (Retina, 13-inch)<\/strong>\n<ul>\n<li>Models: 2018, 2019, 2020<\/li>\n<li>Sold new from Oct 2018\u2013Nov 2020<\/li>\n<\/ul>\n<\/li>\n<li><strong>MacBook Pro (13-inch)<\/strong>\n<ul>\n<li>Models: 2016, 2017, 2018, 2019, 2020, with Two or Four Thunderbolt 3 Ports<\/li>\n<li>Sold new from Oct 2016\u2013Oct 2021<\/li>\n<\/ul>\n<\/li>\n<li><strong>MacBook Pro (15-inch)<\/strong>\n<ul>\n<li>Models: 2016, 2017, 2018, 2019<\/li>\n<li>Sold new from Oct 2016\u2013Nov 2019<\/li>\n<\/ul>\n<\/li>\n<li><strong>MacBook Pro (16-inch)<\/strong> \u2014 sold new from Nov 2019\u2013Oct 2021<\/li>\n<\/ul>\n<p>Each of these Macs has a potentially affected Intel processor from the 6th\u201310th generation (Skylake, Kaby Lake, Coffee Lake, Amber Lake, Cascade Lake, Ice Lake, or Comet Lake).<\/p>\n<p>Although Downfall also affects 11th generation Intel processors, Apple had stopped releasing new Intel-based Mac models before this generation&#8217;s debut in 2021.<\/p>\n<p>Apple finally stopped selling Intel-based Macs (at least as &#8220;new&#8221; products) this year; it discontinued the Mac mini (2018) in January, and the Mac Pro (2019) in June 2023.<a name=\"whichmacsfix\"><\/a><\/p>\n<h3>If Apple releases updates, which Macs will likely get fixed?<\/h3>\n<p>Firmware updates are the Mac&#8217;s equivalent of BIOS updates. For the past several years, Apple has bundled Mac firmware updates with macOS updates; they&#8217;re not available as separate downloads. Firmware updates are installed automatically, as needed, as part of the macOS patching process.<\/p>\n<p>It may be safe to assume that Apple has not yet released updates to address Downfall for any Macs. There&#8217;s no mention of CVE-2022-40982 or Downfall on Apple&#8217;s security updates page or its support site. Now that the general public has known about the vulnerability for more than a week, and most major PC hardware manufacturers have released statements, Apple&#8217;s silence hints that it likely hasn&#8217;t silently bundled patches with past macOS updates.<\/p>\n<p>But macOS Sonoma is right around the corner. It only supports certain Mac models released in 2018 or later (aside from the iMac Pro, which only has a single model released in 2017; it&#8217;s the only 2017 Mac that officially supports Sonoma).<\/p>\n<p>That might mean that, even if Apple releases firmware updates to mitigate Downfall, the other 2015, 2016, and 2017 Mac models might not get any updates.<\/p>\n<p>If that&#8217;s the case, then those 2015\u20132017 models could be stuck with a perpetual hardware vulnerability. (Of course, not being able to run macOS Sonoma also leaves them at risk anyway, because <a href=\"https:\/\/www.intego.com\/mac-security-blog\/when-does-an-old-mac-become-unsafe-to-use\/\">Apple doesn&#8217;t fully patch the two previous macOS versions<\/a>.)<\/p>\n<p>Again, at this point we can only speculate about which models may be vulnerable to Downfall, and what Apple might do about it. We&#8217;ll have to wait and see whether Apple acknowledges the problem and how it decides to handle it.<a name=\"learnmore\"><\/a><\/p>\n<h3>How can I learn more?<\/h3>\n<p>We briefly talked about the Downfall vulnerability on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/nightowl-downfall-and-linkedin-hacks-intego-mac-podcast-episode-305\/\">episode 305<\/a> of the <a href=\"https:\/\/podcast.intego.com\">Intego Mac Podcast<\/a>.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+CvneiF3L?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>You can read our write-ups about the first major speculative execution vulnerabilities, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/\">Meltdown and Spectre<\/a>, as well as a later attack called <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-spoiler-attack-puts-intel-processors-at-risk\/\">SPOILER<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"5KEBUgXKhP\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/\">Meltdown and Spectre: What Apple users need to know<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Meltdown and Spectre: What Apple users need to know&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/meltdown-and-spectre-what-apple-users-need-to-know\/embed\/#?secret=5KEBUgXKhP\" data-secret=\"5KEBUgXKhP\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>By the way, Apple never did release a statement about SPOILER, or patches to mitigate it. To this day, it remains unclear whether Macs were impacted.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"FMFqaaOva8\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-spoiler-attack-puts-intel-processors-at-risk\/\">New SPOILER attack puts Intel processors at risk<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;New SPOILER attack puts Intel processors at risk&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/new-spoiler-attack-puts-intel-processors-at-risk\/embed\/#?secret=FMFqaaOva8\" data-secret=\"FMFqaaOva8\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, including security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Downfall, a major Intel processor vulnerability like Spectre and Meltdown, has just come to light. Some older Macs may (or may not) be impacted; Apple has not made any statement about it. Here is what Mac users should know.<\/p>\n","protected":false},"author":14,"featured_media":98684,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[4712,143],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Downfall, a major Intel processor vulnerability like Spectre and Meltdown, has just come to light. Some older Macs may (or may not) be impacted; Apple has not made any statement about it. Here is what Mac users should know.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Does the Downfall vulnerability affect Intel Macs? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Downfall, a major Intel processor vulnerability like Spectre and Meltdown, has just come to light. Some older Macs may (or may not) be impacted; Apple has not made any statement about it. Here is what Mac users should know.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-19T03:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-27T21:08:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/08\/Downfall-vulnerability-Intel-iMac-falling-down-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/08\/Downfall-vulnerability-Intel-iMac-falling-down-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/08\/Downfall-vulnerability-Intel-iMac-falling-down-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Downfall vulnerability Intel iMac falling down slipping on a banana peel with a kernel panic on screen\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/\",\"name\":\"Does the Downfall vulnerability affect Intel Macs? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#primaryimage\"},\"datePublished\":\"2023-08-19T03:30:00+00:00\",\"dateModified\":\"2023-10-27T21:08:52+00:00\",\"description\":\"Downfall, a major Intel processor vulnerability like Spectre and Meltdown, has just come to light. Some older Macs may (or may not) be impacted; Apple has not made any statement about it. Here is what Mac users should know.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Does the Downfall vulnerability affect Intel Macs?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Does the Downfall vulnerability affect Intel Macs?\",\"datePublished\":\"2023-08-19T03:30:00+00:00\",\"dateModified\":\"2023-10-27T21:08:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#webpage\"},\"wordCount\":1107,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/08\/Downfall-vulnerability-Intel-iMac-falling-down-400x260-1.jpg\",\"keywords\":[\"Speculative Execution\",\"Vulnerabilities\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Downfall, a major Intel processor vulnerability like Spectre and Meltdown, has just come to light. Some older Macs may (or may not) be impacted; Apple has not made any statement about it. Here is what Mac users should know.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/","og_locale":"en_US","og_type":"article","og_title":"Does the Downfall vulnerability affect Intel Macs? - The Mac Security Blog","og_description":"Downfall, a major Intel processor vulnerability like Spectre and Meltdown, has just come to light. Some older Macs may (or may not) be impacted; Apple has not made any statement about it. Here is what Mac users should know.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2023-08-19T03:30:00+00:00","article_modified_time":"2023-10-27T21:08:52+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/08\/Downfall-vulnerability-Intel-iMac-falling-down-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/08\/Downfall-vulnerability-Intel-iMac-falling-down-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/08\/Downfall-vulnerability-Intel-iMac-falling-down-400x260-1.jpg","width":400,"height":260,"caption":"Downfall vulnerability Intel iMac falling down slipping on a banana peel with a kernel panic on screen"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/","name":"Does the Downfall vulnerability affect Intel Macs? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#primaryimage"},"datePublished":"2023-08-19T03:30:00+00:00","dateModified":"2023-10-27T21:08:52+00:00","description":"Downfall, a major Intel processor vulnerability like Spectre and Meltdown, has just come to light. Some older Macs may (or may not) be impacted; Apple has not made any statement about it. Here is what Mac users should know.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Does the Downfall vulnerability affect Intel Macs?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Does the Downfall vulnerability affect Intel Macs?","datePublished":"2023-08-19T03:30:00+00:00","dateModified":"2023-10-27T21:08:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#webpage"},"wordCount":1107,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/08\/Downfall-vulnerability-Intel-iMac-falling-down-400x260-1.jpg","keywords":["Speculative Execution","Vulnerabilities"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/does-the-downfall-vulnerability-affect-intel-macs\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/08\/Downfall-vulnerability-Intel-iMac-falling-down-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-pFC","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98680"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=98680"}],"version-history":[{"count":19,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98680\/revisions"}],"predecessor-version":[{"id":98728,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/98680\/revisions\/98728"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/98684"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=98680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=98680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=98680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}