As phrase of the large safety flaw in laptop processing models unfold yesterday, firms responded to reassure clients and clarify the steps they’re taking to ship software program patches to handle the problems.

But the Computer Emergency Response Team, or CERT, has issued a press release saying there is just one strategy to repair the vulnerability: substitute the CPU. CERT is predicated at Carnegie Mellon University and is formally sponsored by the U.S. Department of Homeland Security’s Office of Cybersecurity and Communications.

“The underlying vulnerability is primarily brought on by CPU structure design decisions,” CERT researchers wrote. “Fully eradicating the vulnerability requires changing susceptible CPU .”

They additionally advise customers to use the varied software program patches however word that it will solely “mitigate the underlying vulnerability.”

The pronouncement from CERT doesn’t carry any regulatory obligation for the businesses whose CPUs are affected. But the distributors that CERT lists as being affected embrace most of the greatest names in tech: AMD, Apple, ARM, Google, Intel, Microsoft, and Mozilla.

Together, these firms account for a large portion of the chips utilized in computer systems and smartphones. Were they to return beneath authorized or public strain to supply substitute CPUs, the prices can be nearly unattainable to calculate.

For now, the businesses need to hope that the software program patches scale back safety danger sufficiently to keep away from widespread authorized actions and additional public backlash.

This article sources info from VentureBeat