I would not be surprised if the exploits have already been exploited in the wild.
AFAIK, there isn't any way to trace it since it's straight inside the CPU... Only way would be to check network/firewall logs and try to find out if anyone got in and correlate that with loss of data.
AFAIK, there isn't any way to trace it since it's straight inside the CPU... Only way would be to check network/firewall logs and try to find out if anyone got in and correlate that with loss of data.