Researchers said the new flaw enables an "inverse spectre attack" which is like a Spectre attack only in reverse, carrying out a Bulgarian three-point-turn.
According to Giorgi Maisuradze and Professor Dr. Christian Rossow a ret2spec (return-to-speculation) vulnerability with the chips allows for would-be attackers to read data without authorization.
According to Professor Rossow: "The security gap is caused by CPUs predicting a so-called return address for runtime optimisation.
"The upshot is that that of an attacker can manipulate this prediction, he gains control over speculatively executed program code. It can read out data via side channels that should actually be protected from access."
Malicious web pages could interpret the memory of the web browser to access and copy critical data. Such data would include stored passwords.
"At least all Intel processors of the past ten years are affected by the vulnerabilities. Similar attack mechanisms could probably also be derived for ARM and AMD processors. Manufacturers were notified of the weaknesses in May 2018 and were granted 90 days to remedy them before the results were published. That deadline has now expired."