Opinion
23-cv-05761-HSG
08-15-2024
ORDER GRANTING DEFENDANT'S MOTION TO DISMISS, TERMINATING AS MOOT DEFENDANT'S MOTION TO STAY DISCOVERY, AND IMPOSING TEMPORARY DISCOVERY STAY Re: Dkt. Nos. 30, 33
HAYWOOD S. GILLIAM, JR. UNITED STATES DISTRICT JUDGE
Pending before the Court are Defendant's motions to dismiss and to stay discovery pending resolution of the motion to dismiss. Dkt. Nos. 30, 33. The Court finds these matters appropriate for disposition without oral argument and the deems them submitted. See Civil L.R. 7-1(b). For the reasons discussed below, the Court GRANTS Defendant's motion to dismiss, TERMINATES AS MOOT Defendant's motion to stay discovery, and temporarily STAYS DISCOVERY until Plaintiffs allege an actionable claim.
I. BACKGROUND
On November 11, 2023, Darques Smith, Renee Waltrip, Brian Cameron, Elizabeth Cordova and Michael Worley, on behalf of themselves and all others similarly situated nationwide (“Plaintiffs”), filed a class action complaint against Intel Corporation (“Defendant”). See Dkt. No. 1 (“Compl.”). Plaintiffs - who purchased central processing units (“CPUs”) and computers incorporating CPUs made by Defendant - allege that Defendant knowingly sold CPUs with a security vulnerability. Id. ¶ 1, 5. According to Plaintiffs, Defendant was on notice of a hardware defect that created this security threat, but nevertheless continued to sell CPUs without fixing the root cause or disclosing the alleged defect. Moreover, Plaintiffs allege that Defendant knew that the only way to fix a hardware issue of the sort alleged would be to deploy software “patches” that throttled the processing power of the CPUs.
At a high level, the security vulnerability that Plaintiffs allege relates to a computer processing technique called “branch prediction.” According to Plaintiffs, branch prediction is a “speculative procedure” developed in the 1990s designed to overcome barriers to speedy computing caused by slow memory retrieval. Id. ¶ 75. Without branch prediction, “a CPU that sequentially executes instructions will encounter a conditional instruction - one dependent on a value stored in memory,” and “must wait until that value is fetched from memory (which is relatively slow to access) to continue execution.” Id. ¶ 76. Branch prediction gets around this time lag by “predict[ing] what a program will likely do when the processor encounters a conditional instruction (i.e., an instruction dependent on some in-memory value).” Id. ¶ 77. A specific technique for implementing branch prediction is called “speculative execution,” which Plaintiffs allege is “an inherent part of a modern CPU's computation process” on which modern CPU performance depends. Id. ¶ 82. Plaintiffs allege that speculative execution works as follows:
[F]aced with a conditional instruction - i.e., an instruction based on a value that must be retrieved - a CPU guesses what the value will be instead of waiting for its retrieval from memory, and executes code based on that guess. If, when the memory contents are fetched, the guess is incorrect, the CPU discards the “speculative” code. If the guess was right, the CPU has already executed past the conditional instruction (e.g., conditional branch) without waiting, obviating the need to wait for memory or system input/output to continue executing.Id. ¶ 80. In short, speculative execution allows processors to “speculate on future instruction directions and proactively execute instructions along these paths before knowing if the instructions are correct,” and to deliver performance gains when the speculative instruction correctly matches the value ultimately retrieved from the CPU memory. Id. ¶ 84.
But the guessed instructions - referred to as “transient instructions” - apparently must be “completely cleared” from the CPU's short-term memory after execution. Id. ¶ 83. A CPU's failure to flush transient instructions leaves “side effects” (i.e. lingering data) that can cause “serious security problems,” according to Plaintiffs. Id. ¶ 84. The security problems arise from the fact that the privileged data retrieved from the CPU's memory to facilitate instruction execution can become accessible to and exploitable by other parts of the computer which should not have that access to that privileged data if retained by the CPU. Id. ¶¶ 90, 95.
Plaintiffs allege that Defendant's hardware design is defective in that “it fails to ensure that side effects of [transient] instructions do not linger in various parts of the CPU accessible to the running program.” Id. ¶ 89. Instead of properly flushing these instructions, Defendant's CPUs allegedly “cause the CPU's cache to store memory information previously required by speculatively executed code, meaning that even if the transient code is discarded, some data remains in the CPU's cache.” Id. ¶ 90. Additionally, Defendant's CPUs supposedly also use “instruction buffers, where transient code may store information associated with particular instructions. Id. ¶ 91. Plaintiffs allege that Intel's failure to “ensure that transient code is prevented from making lingering changes to shared CPU resources” makes its CPUs vulnerable to a class of attacks called transient execution attacks. Id. ¶ 92.
According to Plaintiffs, the CPUs' susceptibility to this novel class of attacks was publicly revealed in 2018, after researchers at Google identified vulnerabilities they dubbed “Spectre” and “Meltdown.” Id. ¶ 97. Spectre and Meltdown are ‘“transient execution' attacks, meaning that they exploit the side effects of speculative code generated during speculative execution like branch prediction.” Id. ¶ 101. Importantly, these vulnerabilities “can be exploited to steal sensitive data present in a computer system's memory.” Id. ¶ 98. And according to Plaintiffs, Spectre and Meltdown were but two of a “larger class of vulnerabilities” arising from Defendant's hardware design of its branch prediction and segmentation systems. Id. ¶¶ 109, 115.
In response to the discovery of the Spectre and Meltdown attacks, Defendant deployed software updates (or “patches”) to address the security vulnerability supposedly endemic to the hardware. But according to Plaintiffs, Defendant's mitigation “essentially handicapped the functionality in Intel CPUs used to predict branches, to speculatively execute code, and to execute code out of order.” Id. ¶ 120. Plaintiffs allege that Wired reported in March 2018 that “attempts to disable [the vulnerability] at the software level can have a marked performance cost” - namely, significantly reduced computing speeds. Id. ¶¶ 121, 126. The only solution to the transient execution attacks, according to Wired, was to “physically replace all the chips, a change which will take at least a full hardware generation to propagate.” Id. ¶ 119. Plaintiffs allege that Intel said it would do just that: in a March 15, 2018 press release, Intel CEO Brian Krzanich allegedly promised “a new hardware design in future chips to finally deal with the Spectre/Meltdown class of vulnerability, including Spectre and Meltdown variants,” and indicated that design would be incorporated into 8th generation chips by late 2018. Id. ¶ 126.
As the Court explains more fully below, the revelations about the Meltdown and Spectre vulnerabilities (experienced not only by Intel but also Apple and Advanced Microdevices (“AMD”)) and the throttling mitigations they required spurred at least three lawsuits in district courts in the Ninth Circuit.
Plaintiffs allege that “Intel's 2018 hardware redesign to overcome Spectre and Meltdown vulnerabilities would need to secure its [Advanced Vector Extension] instructions, along with other attack vectors,” and that Intel knew that. Id. ¶¶ 134. As Plaintiffs explain, “[a] vector instruction is a CPU instruction that can perform the same type of operations on multiple data samples in a particularly efficient manner,” and is “central to the performance and function of any high-end CPU.” Id. ¶¶ 131, 132. Plaintiffs allege that in mid-2018, while Defendant was undertaking its reengineering to address the Spectre and Meltdown class of attacks, Defendant became aware of its CPUs' Advanced Vector Extension (“AVX”) instructions being vulnerable to side-channel attacks of the type exploited for Spectre/Meltdown. Id. ¶ 135. One “hardware enthusiast” developed and reported to Defendant in June 2018 an exploit he called “AVX Clock Spectre,” which, like the original Spectre attack, “exploited side effects left over from a predicted branch of execution.” Id. ¶ 138. Around that time, “another AVX-based transient execution exploit emerged, called NetSpectre.” Id. ¶ 145. Plaintiffs allege that “despite multiple (publicly known) vulnerability disclosures made to Intel on the subject, Intel did not carefully analyz[e] possible side-effects in the AVX [instructions] and engineering hardware solutions to fix them in 2018.” Id. ¶ 151. Instead, Plaintiffs allege that “Intel put profits first, selling defective CPUs for years after it clearly knew them to be defective, and knew that the hardware implementation of Intel's branch prediction systems needed to be addressed to prevent leaking side effects from speculative execution - specifically as to Intel's AVX instructions.” Id.
Plaintiffs allege that Defendant's failure to address the root cause led to the “inevitable”: in August 2023, Defendant publicly acknowledged a new vulnerability called “Downfall,” which “allowed an attacker to launch a transient execution attack using Intel's AVX instructions and side effects left by Intel's defective branch prediction system.” Id. ¶¶ 153-54. While Plaintiffs' complaint alleges many additional technical facts about the nature of this attack, the bottom line is their allegation that the attack emerged because Intel “had done nothing to safeguard against the CPUs' cache retaining what should have been discarded data resulting from speculative execution,” even though it allegedly knew that the Spectre and Meltdown attacks exploited similar vulnerabilities and had allegedly received direct warnings in Summer 2018 regarding the AVX instruction set. Id. ¶ 167. The lack of root-cause hardware solutions is reflected, Plaintiffs allege, by the fact that Intel's 9th through 11th generation chips were vulnerable to Downfall even though they “were supposed to have received hardware redesigns that would fix the class of vulnerabilities associated with Spectre, Meltdown, and other transient execution attacks.” Id. ¶ 176.
Plaintiffs allege that the mitigations Intel released to address the “incurable vulnerability” of Downfall was a “medicine . . . on par with the disease.” Id. ¶¶ 182, 184. These mitigations purportedly “destroyed CPU performance for certain, critical processing tasks,” causing “performance degradation” of up to 50% that users could not easily avoid. Id. ¶ 184. Plaintiffs allege that this degree of CPU impairment makes Defendant's products “unmarketable” because “[a]ll modern CPUs rely on sophisticated branch prediction, speculative execution, and out-o-forder execution to achieve expected performance characteristics.” Id. ¶ 196.
Based on Defendant's conduct, Plaintiffs allege violations of the Unfair Competition Law (“UCL”) (Cal. Bus. & Prof. Code § 17200, et seq.), Consumer Legal Remedies Act (“CLRA”) (Cal. Civ. Code § 1750, et seq.), and False Advertising Law (“FAL”) (Cal. Bus. & Prof. Code § 17500, et seq.), and assert claims for fraud by omission, quasi-contract/restitution, negligence, and breach of implied warranty under Cal. Comm. Code § 2314 and the Song-Beverly Consumer Warranty Act (Cal. Civ. Code § 1790, et seq.). In the event a nationwide class is not certified, Plaintiffs also bring in the alternative a variety of claims under Oregon, Kansas, Illinois, and Minnesota law that more or less correspond with the California law violations alleged on behalf of the entire class.
Because the Oregon, Kansas, Illinois, and Minnesota state law claims were pled in the alternative (in the event that the Court does not certify a nationwide class and instead permits state-based subclasses), and given that Defendant's motion only cursorily addresses any of these non-California claims, the Court declines to address them at this time.
On January 25, 2024, Defendant filed a motion to dismiss Plaintiffs' entire complaint and shortly thereafter, a motion to stay discovery. See Dkt. Nos. 30 (“MTD”), 33 (“Stay Mot.”). The motions are fully briefed. See Dkt. No. 42 (“MTD Opp”), 43 (“MTD Reply”), 40 (“Opp. Stay Mot.”), 41 (“Reply Stay Mot.”).
II. LEGAL STANDARD
Federal Rule of Civil Procedure 8(a) requires that a complaint contain “a short and plain statement of the claim showing that the pleader is entitled to relief.” Fed.R.Civ.P. 8(a)(2). A defendant may move to dismiss a complaint for failing to state a claim upon which relief can be granted under Rule 12(b)(6). “Dismissal under Rule 12(b)(6) is appropriate only where the complaint lacks a cognizable legal theory or sufficient facts to support a cognizable legal theory.” Mendiondo v. Centinela Hosp. Med. Ctr., 521 F.3d 1097, 1104 (9th Cir. 2008). To survive a Rule 12(b)(6) motion, a plaintiff need only plead “enough facts to state a claim to relief that is plausible on its face.” Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570 (2007). A claim is facially plausible when a plaintiff pleads “factual content that allows the court to draw the reasonable inference that the defendant is liable for the misconduct alleged.” Ashcroft v. Iqbal, 556 U.S. 662, 678 (2009).
Rule 9(b) imposes a heightened pleading standard where fraud is an essential element of a claim. See Fed.R.Civ.P. 9(b) (“In alleging fraud or mistake, a party must state with particularity the circumstances constituting fraud or mistake.”); see also Vess v. Ciba-Geigy Corp. USA, 317 F.3d 1097, 1107 (9th Cir. 2003). A plaintiff must identify “the who, what, when, where, and how” of the alleged conduct, so as to provide defendants with sufficient information to defend against the charge. Cooper v. Pickett, 137 F.3d 616, 627 (9th Cir. 1997). However, “[m]alice, intent, knowledge, and other conditions of a person's mind may be alleged generally.” Fed.R.Civ.P. Rule 9(b).
In reviewing the plausibility of a complaint, courts “accept factual allegations in the complaint as true and construe the pleadings in the light most favorable to the nonmoving party.” Manzarek v. St. Paul Fire & Marine Ins. Co., 519 F.3d 1025, 1031 (9th Cir. 2008). Nevertheless, courts do not “accept as true allegations that are merely conclusory, unwarranted deductions of fact, or unreasonable inferences.” In re Gilead Scis. Secs. Litig., 536 F.3d 1049, 1055 (9th Cir. 2008) (quoting Sprewell v. Golden State Warriors, 266 F.3d 979, 988 (9th Cir. 2001)).
Even if the court concludes that a 12(b)(6) motion should be granted, the “court should grant leave to amend even if no request to amend the pleading was made, unless it determines that the pleading could not possibly be cured by the allegation of other facts.” Lopez v. Smith, 203 F.3d 1122, 1127 (9th Cir. 2000) (en banc) (quotation omitted).
III. DISCUSSION
A. Request for Judicial Notice
Along with its motion to dismiss, Defendant filed a request for judicial notice. See Dkt. No. 31. The Court will GRANT the request.
i. Standard
In Khoja v. Orexigen Therapeutics, the Ninth Circuit clarified the judicial notice rule and incorporation by reference doctrine. See 899 F.3d 988 (9th Cir. 2018). Under Federal Rule of Evidence 201, a court may take judicial notice of a fact “not subject to reasonable dispute because it . . . can be accurately and readily determined from sources whose accuracy cannot reasonably be questioned.” Fed.R.Evid. 201(b)(2). Accordingly, a court may take “judicial notice of matters of public record,” but “cannot take judicial notice of disputed facts contained in such public records.” Khoja, 899 F.3d at 999 (citation and quotations omitted). The Ninth Circuit has clarified that if a court takes judicial notice of a document, it must specify what facts it judicially noticed from the document. Id. at 999. Further, “[j]ust because the document itself is susceptible to judicial notice does not mean that every assertion of fact within that document is judicially noticeable for its truth.” Id. As an example, the Ninth Circuit held that for a transcript of a conference call, the court may take judicial notice of the fact that there was a conference call on the specified date, but may not take judicial notice of a fact mentioned in the transcript, because the substance “is subject to varying interpretations, and there is a reasonable dispute as to what the [document] establishes.” Id. at 999-1000.
ii. Analysis
Defendant moves the Court to take judicial notice of seven exhibits referenced in its motion to dismiss. Exhibits 1, 2, and 7 contain publicly available government or government-affiliated webpages, and Exhibit 3 contains a document (“NCCIC Services for Federal Agencies”) downloaded from a government-maintained website (www.CISA.gov). Exhibits 4, 5, and 6 reflect excerpts from complaints filed in In re Intel Corp. CPU Marketing, Sales Practices & Products Liability Litigation, No. 18-md-2828 (D. Or.), ECF No. 209 and Hauck v. Advanced Micro Devices, Inc., No. 18-cv-00447 (N.D. Cal.), ECF Nos. 53, 95 - prior cases against Intel and its competitor AMD relating to the Spectre and Meltdown attacks. All of these materials are judicially noticeable, as the accuracy of their contents is not subject to reasonable dispute. See, e.g., Threshold Enters. Ltd. v. Pressed Juicery, Inc., 445 F.Supp.3d 139, 146 (N.D. Cal. 2020) (taking judicial notice of websites and their contents), Est. of Blue v. Cnty. of L.A., 120 F.3d 982, 984 (9th Cir. 1997) (affirming that court may take judicial notice of filings in other cases). Accordingly, the Court will GRANT Defendant's request. However, in keeping with Khoja, the Court will consider the materials' contents but will not assume their truth.
B. Motion to Dismiss
i. Prior Litigation
Before turning to the merits of the motion before it, the Court acknowledges that this is not the first challenge relating to side-channel attacks on CPUs. Following the revelations about the Spectre and Meltdown vulnerabilities in 2018, various plaintiffs filed suit against Intel and other chip manufacturers such as Apple and AMD alleging claims similar to those pressed here. All of these cases were eventually dismissed with prejudice after numerous opportunities for leave, and those dismissals were ultimately affirmed by the Ninth Circuit in unpublished decisions. See Hauck v. Advanced Micro Devices, Inc., No. 18-CV-00447-LHK, 2019 WL 1493356 (N.D. Cal. Apr. 4, 2019), aff'd, 816 Fed.Appx. 39 (9th Cir. 2020); In re Apple Processor Litig., No. 18-CV-00147-EJD, 2022 WL 2064975 (N.D. Cal. June 8, 2022), aff'd, No. 22-16164, 2023 WL 5950622 (9th Cir. Sept. 13, 2023); In re Intel Corp. CPU Mktg., Sales Pracs. & Prod. Liab. Litig., 614 F.Supp.3d 783 (D. Or. 2022), aff'd, No. 22-35652, 2023 WL 7211394 (9th Cir. Nov. 2, 2023).
Defendant makes much of this litigation history, arguing that the failure of prior claims foretells the failure of these claims. Because this framing device is so pervasive in Defendant's briefing, the Court clarifies at the outset that the allegations in this case are not identical to those at issue in the prior cases. Whereas plaintiffs in the first wave of litigation bought their CPUs before the vulnerability at issue publicly came to light in 2018, Plaintiffs here bought their devices after that juncture. In other words, their claims are not rooted in the post-sale emergence of a novel CPU vulnerability, but rather in Defendant's alleged pre-sale maintenance of that then-known vulnerability. While that factual distinction certainly does not guarantee that any of Plaintiffs' claims survive, it makes the outcomes of the prior cases informative rather than strictly inevitable.
ii. Fraud Claims
Plaintiffs plead claims for fraud-based violations of the FAL, CLRA, and UCL, as well as common law fraud by omission. Defendant moves to dismiss, arguing that Plaintiffs' claims sounding in fraud have not been pled with particularity, as required by Rule 9(b). See Kearns v. Ford Motor Co., 567 F.3d 1120, 1125 (9th Cir. 2009). Considering the arguments presented and construing the pleadings in the light most favorable to Plaintiffs, as it must, the Court is persuaded that dismissal of these omission-based claims is appropriate. Though a close call, the Court finds that Plaintiffs have not done enough to allege an actionable omission under the heightened pleading standard imposed by Rule 9(b).
Defendant also moves to dismiss the claims brought in the alternative under Oregon, Kansas, Illinois, and Minnesota consumer protection laws. At this juncture, the Court declines to evaluate the viability of these or any alternative claims Defendant moves to dismiss.
For reasons that are not clear to the Court, Plaintiffs do not allege any affirmative misrepresentation theory, even as they imply that Intel did not do what it purportedly publicly promised to do. See Compl. ¶¶ 126, 129-30. And even as to the omission theory, Plaintiffs do not specify what marketing material or other communications by Defendant and relied upon by Plaintiffs failed to disclose the alleged defect.
Under California law, omissions that form the basis of claims brought under state consumer protection laws ‘“must be contrary to a representation actually made by the defendant, or an omission of a fact the defendant was obliged to disclose.'” Hodsdon v. Mars, 891 F.3d 857, 861 (9th Cir. 2018) (quoting Daugherty v. Am. Honda Motor Co., 144 Cal.App. 4Th 824, 835 (2006) (emphasis omitted)). “In Hodsdon, the Ninth Circuit - synthesizing recent decisions of the California Courts of Appeal - explained that a plaintiff sufficiently pleads a duty to disclose where: (1) the plaintiff alleges the omission was material; (2) the alleged defect was central to the product's function; and (3) the defendant (a) is plaintiff's fiduciary, (b) has ‘exclusive knowledge' of material facts, (c) ‘actively conceals' a material fact, or (d) makes misleading partial representations.” In re Natera Prenatal Testing Litig., 664 F.Supp.3d 995, 1008 (N.D. Cal. 2023) (quoting Id. at 863); see also LiMandri v. Judkins, 52 Cal.App.4th 326, 337 (1997) (laying out factors listed in (3), referred to as “LiMandri factors”).
Defendant argues that Plaintiffs do not adequately plead that the omission at issue is material. Specifically, Intel contends that the defect could not have had any bearing on Plaintiffs' purchase decisions since they bought their CPUs (or computers containing CPUs) after the Spectre and Meltdown news became public in 2018. MTD at 22. But this argument reveals that Defendant either misapprehends or misconstrues the omission about which Plaintiffs complain. See MTD at 22-23. Unlike the parties in prior litigation, Plaintiffs' complaint is focused not on the emergence of the Spectre and Meltdown attacks in 2017 (which was publicly revealed in 2018), but on Defendant's supposed failure from 2018 onward to address and disclose allegedly known hardware defects - including those affecting the AVX instructions - that allegedly allowed this class of vulnerabilities to persist and ultimately culminate in Downfall. This focus is reflected in Plaintiffs' allegations: Plaintiffs plead that if Intel had disclosed that the speculative execution vulnerabilities revealed in 2018 had not been remediated in the CPU models they purchased, Plaintiffs would not have paid what they did for the products. See Compl. ¶¶ 24, 28, 32, 36. To underscore this point, Plaintiffs allege that they conducted conjoint studies tending to show that “consumers are willing to pay significantly less for a computer with an affected Intel CPU” because an affected Intel CPU “loses 85% of its value because of the security vulnerability.” Id. ¶ 228, 229. At this early stage, these allegations sufficiently allege materiality.
As for centrality of the defect, Plaintiffs are required to plead that “the allegedly concealed physical defect was central to the product's function.” Hodsdon, 891 F.3d at 864 (emphasis in original). The alleged central functionality of a defect cannot be based on “subjective preferences” about a product, but rather must render those products “incapable of use by any consumer.” Id. For instance, while one person may have “no practical use” for a chocolate bar tainted by slave or child labor, “some consumers of chocolate are not concerned about the labor practices used to manufacture the product.” Id. Because a supply chain tarnished by labor violations did not therefore render the chocolate at issue “incapable of use by any consumer,” Hodsdon did not find for the plaintiff. Id. Following Hodsdon, district courts have implemented the central functionality test with some variation: some focus more on whether the alleged defect affects the product's central function “even if the product still retains overall functionality and use,” and others apply the “incapable of use by any consumer” test, based on the phrasing used in Hodsdon. See In re Intel Corp. CPU Mktg., Sales Pracs. & Prod. Liab. Litig., No. 3:18-MD-2828-SI, 2021 WL 1198299, at *8 (D. Or. Mar. 29, 2021) (“Intel II”) (summarizing different approaches).
Defendant argues that while the “incapable of use” standard is correct, Plaintiffs' allegations fail to satisfy either test. MTD at 19. It contends that “Plaintiffs do not, and cannot, allege that the ‘defect' renders Intel CPUs incapable of performing their central function, which is to process instructions.” MTD at 20. The Court ultimately agrees, and finds the rulings in Intel II instructive. In reviewing Intel's second motion to dismiss, the district court presiding over that action observed that “[e]ven if the [central functionality] test does not require that the defect render the product incapable of use by any consumer, the Ninth Circuit was clear in Hodsdon that the defect must be central and important to the product's function.” Intel II, 2021 WL 1198299 at 8. While plaintiffs in that case described the CPU's central function as “processing securely,” the Intel court was not satisfied that plaintiffs' allegations demonstrated that the defect - which was, as it is here, “increased vulnerability to potential cache side-channel attacks” - actually affected the CPUs' processing capabilities. Id. As a result, the Intel court found that the alleged defect did not “go to the central function of the microprocessors” because even with the latent security vulnerability, Intel's chips were able to “perform[] as the ‘brains' of the devices in which they are placed.” Id. (emphasis in original). This ruling was ultimately affirmed in a Ninth Circuit memorandum disposition, which held that the district court's finding was appropriate given that plaintiffs did not allege that their processors ever “stopped operating as ‘the brains of the computing device[s].” In re Intel Corp. CPU Mktg., Sales Pracs. & Prod. Liab. Litig., No. 2235652, 2023 WL 7211394, at *1 (9th Cir. Nov. 2, 2023). The Ninth Circuit also observed that while security vulnerabilities “may well be material to consumers, the security risk presented by the defects alleged . . . does not make those defects central to the processors' function.” Id.
As an unpublished Ninth Circuit decision, In re Intel is not precedent, but may be considered for its persuasive value. See Fed. R. App. P. 32.1; CTA9 Rule 36-3.
Plaintiffs in this case argue that they have met the standard suggested by the Ninth Circuit in In re Intel because they have pled that “the CPUs Intel sold Plaintiffs are defective because they do not operate as ‘the brains' of the computing device and do not perform ‘all necessary computations for each application' and for ‘each peripheral.'” MTD Opp. at 17. The rub, as Defendant points out, is that Plaintiffs have not actually made those allegations. While they have certainly alleged that the defect impairs AVX vector instructions and a CPU's segmentation functionality, Plaintiffs' allegations do not plausibly suggest that impairment of these features causes a CPU to cease operating as the “brains” of a computer. Based on the reasoning adopted in Intel II, which this Court finds persuasive, the lack of allegations connecting the latent security defect to core processing capabilities sinks Plaintiffs' claim. Since Plaintiffs have not adequately pled that the alleged defect was central to the functionality of Intel's microprocessors, the Court can conclude that Plaintiffs have not properly alleged an actionable omission claim, and need not assess whether any LaMandri factors are adequately pled.
As should be clear from this conclusion, the Court does not view the software mitigation patch as an additional or related defect. The patch was not a part of the product at the time of sale, and while Plaintiffs allege that Defendant knew that a patch would be required to address hardware defects, the Court does not find it plausibly alleged that deploying a performance-reducing patch in the future was assured or inevitable at the time of sale. Instead, from that vantage point in time, the only defect was the alleged security vulnerability to side-channel attacks that Plaintiffs allege was endemic to Defendant's CPU hardware design.
Accordingly, the Court GRANTS Defendant's motion to dismiss Plaintiffs' fraud-based FAL, UCL, CLRA, and common law claims.
iii. Quasi-Contract/Unjust Enrichment
Defendant moves to dismiss Plaintiffs' claims for quasi-contract and unjust enrichment. Although there is no standalone cause of action in California for “unjust enrichment,” courts may “construe [a claim for unjust enrichment] as a quasi-contract claim seeking restitution.” Astiana v. Hain Celestial Grp., Inc., 783 F.3d 753, 762 (9th Cir. 2015).
Plaintiffs contend that restitution is due to them because Intel knew “that the Affected Intel CPUs, and computers built around them, were actually worth substantially less than the price they were sold for” as a result of their unreasonable insecurity, but nevertheless failed to provide any “discount or disclosure to account for their actual, degraded” condition. MTD Opp. at 29. With this claim, Plaintiffs seek disgorgement of that allegedly wrongfully retained premium. Defendant argues that because Plaintiffs failed to plead an actionable omission, their efforts to recover restitution under a quasi-contract theory must also fail, since Defendant's retention of benefits is not “unjust or inequitable.” MTD at 29. The Court agrees. “[A] restitution claim based on fraud or consumer protection claims must nonetheless be dismissed if the plaintiff fails to sufficiently plead an actionable misrepresentation or omission.” In re Apple Processor Litig., No. 18-CV-00147-EJD, 2022 WL 2064975, at *12 (N.D. Cal. June 8, 2022), aff'd, No. 22-16164, 2023 WL 5950622 (9th Cir. Sept. 13, 2023). Here, as in In re Apple, Plaintiffs' “unjust enrichment claim relies on the same set of allegations as Plaintiffs' [f]raud [c]laims addressed above, namely that [Intel] fraudulently omitted information regarding the [security defect],” such that “their unjust enrichment claim relying on the same alleged fraudulent conduct must also be dismissed.” Id. Defendant's motion is GRANTED on this theory.
iv. Negligence
Defendant moves to dismiss Plaintiffs' claim for negligence. The Court will GRANT the motion on this theory.
To state a claim for negligence under California law, a plaintiff must establish (1) duty, (2) breach of duty, (3) causation, and (4) damages. See Merill v. Navegar, Inc., 26 Cal.4th 465, 500 (Cal. 2001). However, “plaintiffs asserting negligence claims ordinarily may not recover purely economic damages unconnected to physical injury or property damage .... Economic losses include damages for inadequate value, costs of repair, loss of expected proceeds, loss of use, loss of goodwill, and damages paid to third parties.” Castillo v. Seagate Tech., LLC, 2016 WL 9280242, at *5 (N.D. Cal. Sept. 14, 2016). This is the economic loss doctrine. “But ‘California decisional law has long recognized that the economic loss rule does not necessarily bar recovery in tort for damage that a defective product . . . causes to other portions of a larger product . . . into which the former has been incorporated.'” Hauck v. Advanced Micro Devices, Inc., No. 18-CV-00447-LHK, 2018 WL 5729234, at *10 (N.D. Cal. Oct. 29, 2018) (“AMD I”) (quoting Jimenez v. Superior Ct., 29 Cal.4th 473, 483 (2002)). Nonetheless, if the damage to the larger product was “closely related” to the nature of the defect, then the economic loss doctrine may still prevent recovery. See In re Sony Vaio Computer Notebook Trackpad Litig., No. 09CV2109 BEN RBB, 2010 WL 4262191, at *7 (S.D. Cal. Oct. 28, 2010) (finding economic loss doctrine applicable in case where “trackpad was integral to the function of the notebook,” “any damage to the notebook, i.e. erratic tracking and freezing, was closely related to the nature of the defect in the trackpad,” and allegations lacked any suggestion that “a trackpad would have any use to Plaintiffs outside of the notebooks.”). In other words, “[w]hen the defect and the damage are one and the same, the defect may not be considered to have caused physical injury.” KB Home v. Superior Ct., 112 Cal.App.4th 1076, 1085 (2003) (internal quotations omitted) (citing Sacramental Regional Transit Dist. v. Grumman Flxible, 158 Cal.App.3d 289, 294 (1984)).
Defendant argues that the economic loss doctrine bars Plaintiffs' claims, and that Plaintiffs have not adequately pled that Defendant breached the standard of care. MTD at 28-29. Plaintiffs respond that their allegations not only detail breach, but also describe how the affected CPUs caused property damage to the computers that incorporated them, thereby circumventing the economic loss doctrine. MTD Opp. at 30-32. Because Defendant has the better of the arguments as to the applicability of the economic loss doctrine, the Court does not reach the standard of care question. As to physical injury allegedly caused by the CPUs, Plaintiffs plead that Defendant's negligently designed CPUs led to “diminished battery life (for laptops) and (for all computers) a diminished expected life for the CPU and nearby components due to the CPU running for longer and at hotter temperatures.” Compl. ¶ 408. But based on the nature of the relationship between the CPU and the computer - with the latter physically incorporating the former and deriving its core functionality from it - the Court agrees with Defendant that the CPUs are not “analytically separate” from the computers they are in. AMD I, 2018 WL 5729234, at *11. Whether preinstalled in Plaintiffs' laptops or integrated by Plaintiffs into their computers, the affected CPUs are “integrally tied” to other components and the computer overall such that they cannot realistically be viewed as a standalone defective product harming another discrete piece of property. See id. Because “Plaintiffs' allegations indicate that the [computer], rather than the [CPU] is the product at issue,” In re Sony, 2010 WL 4262191, at *7, Plaintiffs' negligence claim seeks to recover damages that are barred by the economic loss doctrine, and the Court will accordingly GRANT Defendant's motion to dismiss it.
v. Breach of Implied Warranty
Defendant moves to dismiss Plaintiffs' nationwide breach of implied warranty of merchantability claims, brought under California Commercial Code section 2314 and Civil Code section 1790 (the Song-Beverly Consumer Warranty Act). The Court will GRANT the motion.
California law provides that “a warranty that the goods shall be merchantable is implied in a contract for their sale if the seller is a merchant with respect to goods of that kind.” Cal. Com. Code § 2314(1); see also Cal. Civ. Code § 1792 (establishing that “every sale of consumer goods that are sold at retail in this state shall be accompanied by the manufacturer's and the retail seller's implied warranty that the goods are merchantable”). The implied warranty of merchantability “does not impose a general requirement that goods precisely fulfill the expectation of the buyer. Instead, it provides for a minimum level of quality.” Am. Suzuki Motor Corp. v. Superior Court, 37 Cal.App.4th 1291, 1296 (Cal.App. 1995) (internal quotation omitted). Rather, for an implied warranty claim to survive a motion to dismiss, the plaintiff must plausibly allege that the product at issue has manifested a problem so serious that it lacks ‘“even the most basic degree of fitness for ordinary use.”' Birdsong v. Apple, Inc., 590 F.3d 955, 958 (9th Cir. 2009) (quoting Mocek v. Alfa Leisure, Inc., 114 Cal.App.4th 402, 406 (Cal.App. 2003)).
Defendant argues that Plaintiffs' implied warranty claim fails for two reasons: first, because Plaintiffs have not plausibly alleged that the affected CPUs lacked “even the most basic degree of fitness for ordinary use,” and second, because of the nature of the third-party transaction. MTD at 26-28, 30-31. While the Court is skeptical, based on Plaintiffs' allegations, that the CPUs at issue lack even a “basic degree of fitness,” it need not reach that question, as Defendant's other arguments concerning the structure of the transaction convince the Court that the claim cannot proceed as pled. For one, it appears that Plaintiffs and Defendant are not in vertical privity, which is a strict requirement for breach of implied warranty claims under California law. See Clemens v. DaimlerChrysler Corp., 534 F.3d 1017, 1024 (9th Cir. 2008). As explained in Mandani v. Volkswagen Group of America, Inc., this Court, after carefully considering the circuit split on this issue, has not found a third-party beneficiary exception to these privity requirements. No. 17-CV-07287-HSG, 2019 WL 652867, at *5-6 (N.D. Cal. Feb. 15, 2019). As a result, since Plaintiffs Cameron and Waltrip - the only named Plaintiffs asserting this claim - allege that they purchased the products at issue from third-party retailers rather than from Defendant directly, the Court is of the view that Plaintiffs and Defendant are not “adjoining links in the distribution chain,” as required for this claim as a matter of California law. Id. at *5 (quoting Clemens, 534 F.3d at 1023). Accordingly, the Court finds that their allegations do not state a claim.
Further, Plaintiffs do not plausibly plead that for purposes of California Civil Code section 1792, the transactions at issue occurred in California. See Civ. Code § 1792 (“[E]very sale of consumer goods that are sold at retail in this state ....”) (emphasis added). Plaintiffs plead only that Cameron and Waltrip purchased their products from third party retailers named Microcenter and Newegg.com. Compl. ¶ 438. While Plaintiffs allege that Intel “is headquartered in California and directs its United States sales and shipping operations from California,” Id. ¶ 430, there is no allegation that “Intel shipped anything to Cameron or Waltrip, or that Microcenter or NewEgg is affiliated with Intel in any way.” MTD Reply at 19. Without an allegation that makes plausible that Plaintiffs' transactions with Microcenter or NewEgg occurred in California (with Intel or otherwise), the Court cannot conclude that the products at issue were “sold at retail in this state” as opposed to any other, as section 1792 requires.
Accordingly, the Court GRANTS Defendant's motion to dismiss Plaintiffs' implied warranty of merchantability claims.
vi. UCL - Unfair and Unlawful Prongs
Defendant moves to dismiss Plaintiffs' claims under the unlawful and unfair prongs of the UCL. The Court first considers Defendant's arguments against Plaintiffs' unfair prong claim. While the standard for unfair UCL claims is unsettled, see Price v. Apple, Inc., No. 21-CV-02846-HSG, 2022 WL 1032472, at *4 (N.D. Cal. Apr. 6, 2022) (explaining competing standards), Plaintiffs allege that under one of the accepted balancing tests, Defendant's practice is unfair because its “impact on [victim Plaintiffs] outweigh the reasons, justifications, and motives of [Intel,] the alleged wrongdoer.” Doe v. CVS Pharmacy, Inc., 982 F.3d 1204 (9th Cir. 2020) (internal quotation omitted). Plaintiffs argue that their unfair claim does not rely on the viability of their fraud theory, asserting that “Intel's decision to sell CPUs without the necessary mitigations to make them safe against a known vulnerability was an unfair practice - a practice distinct from Intel's fraudulent omission.” MTD Opp. at 20. But the Court is not persuaded that the complaint reflects this distinction. In pleading their unfair UCL claim, Plaintiffs characterize as “unfair” Defendant's failure to properly redesign its hardware after Spectre, Meltdown, and the warnings about the AVX instruction set, as well as its adoption of a mitigation patch that substantially impairs the operation of Defendant's CPUs. It strikes the Court that there is little to no daylight between these allegations and the allegations supporting Plaintiffs' fraud claims, which the Court found inactionable. Accordingly, since it does not adequately allege either a distinct, unfair practice or an actionable omission, the Court finds that Plaintiffs fail to allege conduct supporting a claim that Intel engaged in unfair conduct. See Intel II, 2021 WL 1198299 at *11. Accordingly, the Court GRANTS Defendant's motion to dismiss this claim.
As for Defendant's motion to dismiss Plaintiffs' unlawful prong claim, the Court also GRANTS it. Plaintiffs can only survive a motion to dismiss claims brought under this prong if they plead sufficient facts to support another cause of action. See Moran v. Prime Healthcare Mgmt., Inc., 3 Cal.App. 5th 1131, 1142 (2016). Since they have not, their UCL unlawful prong claim cannot survive Defendant's motion to dismiss. See Cullen v. Netflix, Inc., 880 F.Supp.2d 1017, 1028 (N.D. Cal. 2012) (Where “other claims fail, [the] UCL claims premised on ‘unlawful acts ha[ve] no basis and must also fail.”).
A. Motion to Stay Discovery
Defendant previously moved to stay discovery pending resolution of the motion to dismiss. Dkt. No. 33. Seeing as the Court resolved the motion to dismiss before ruling on Defendant's motion for a temporary stay, the Court will TERMINATE Defendant's motion as moot since the relief it requests is no longer available. However, having found the underlying motion to dismiss warrants dismissal of the complaint in its entirety, the Court finds that there is good cause to temporarily stay discovery until it is clear if any claims will proceed based on Plaintiffs' amendments. See Rutman Wine Co. v. E. & J. Gallo Winery, 829 F.2d 729, 738 (9th Cir. 1987) (“It is sounder practice to determine whether there is any reasonable likelihood that plaintiffs can construct a claim before forcing the parties to undergo the expense of discovery.”). Accordingly, the Court will STAY discovery in this case until otherwise ordered.
IV. CONCLUSION
The Court GRANTS Defendant's motions to dismiss, Dkt. No. 30 and TERMINATES AS MOOT its motion to stay discovery pending resolution of that motion, Dkt. No. 33. Because granting Plaintiffs an opportunity to amend their complaint would not be futile, cause undue delay, or unduly prejudice Intel, and Plaintiffs have not acted in bad faith, the Court grants leave to amend. Any amended complaint is due within 28 days of the date of this order. However, given that Plaintiffs' first consolidated class action complaint failed to state a viable claim, the Court will STAY DISCOVERY until it is clear whether Plaintiffs can successfully cure the defects identified in this order.
IT IS SO ORDERED.