"We are in the process of deploying mitigations to Cloud services and have also released security updates to protect Windows customers against vulnerabilities affecting supported hardware chips from Intel, ARM, and AMD," the company added.
Intel said it was working with many other technology companies such as AMD, ARM Holdings and several operating system vendors to develop an industry-wide approach to resolve this issue "promptly and constructively".
Intel said the vulnerability, discovered by a British tech website the Register, was not unique to Intel products, Xinhua news agency reported.
"Recent reports that these exploits are caused by a 'bug' or a 'flaw' and are unique to Intel products are incorrect. Based on the analysis to date, many types of computing devices -- with many different vendors' processors and operating systems - are susceptible to these exploits," Intel said in a statement.
"Intel has begun providing software and firmware updates to mitigate these exploits," the chip maker added.
Meanwhile, cyber security experts advised enterprises running businesses on Cloud to instal available security patches without delay.
There are two major security flaws in chips. One is called "Meltdown" that impacts only Intel chips while the other, called "Spectre", affects all chips including ARM and AMD.
"As these are hardware bugs, patching is a significant job. Patches against 'Meltdown' have been issued for Linux, Windows and OS X and work is underway to strengthen software against future exploitation of 'Spectre,'" said Senior Security Researchers Ido Naor and Jornt van der Wiel from Kaspersky Lab's Global Research and Analysis Team (GreAT).
Intel has a tool people can use to check if their systems are vulnerable to the bugs.
"It is vital that users instal any available patches without delay. It will take time for attackers to figure out how to exploit the vulnerabilities -- providing a small but critical window for protection," the experts advised.
"This issue represents a higher risk in Cloud environments because it would be easy to create an AWS or Microsoft Azure account, start a new instance and then run the exploit to dump memory of the server which would be hosting many other instances of other customers," said K.K. Mookhey, CEO and Founder of Network Intelligence, a cyber security consulting firm.
(This story has not been edited by Business Standard staff and is auto-generated from a syndicated feed.)
Business Standard has always strived hard to provide up-to-date information and commentary on developments that are of interest to you and have wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offering have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-19, we continue to remain committed to keeping you informed and updated with credible news, authoritative views and incisive commentary on topical issues of relevance.
We, however, have a request.
As we battle the economic impact of the pandemic, we need your support even more, so that we can continue to offer you more quality content. Our subscription model has seen an encouraging response from many of you, who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of offering you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practise the journalism to which we are committed.
Support quality journalism and subscribe to Business Standard.