Create Case

VN 2018-001 (CVE-2017-5715, CVE-2017-5753 - Spectre)

  • Article Type:
  • Vulnerability Notice
  • Article Number:
  • 000018943
  • Last Modified:
  • 4/19/2018

Vulnerability Summary

 
"Spectre" is an attack that utilizes the speculative execution mechanism in modern processors to create a side-channel attack using the processor cache. Local execution of a crafted program is required to conduct the exploit.

The Spectre exploit has been demonstrated to communicate arbitrary kernel space memory contents to an unprivileged user process. However, the Spectre exploit may be utilized to create arbitrary illegal information flows between two cooperating subjects running crafted code.

Extreme products utilize a number of different processor architectures, some of which contain the Spectre vulnerability. Currently demonstrated Spectre exploits require execution of crafted code installed on the target device. Extreme products that do not provide a mechanism to execute third-party code are not exposed to Spectre exploits provided other unauthorized means are not employed to gain privileged access to the system to install code.

While it is theoretically possible to conduct an attack strictly via network access, the challenges that must be overcome to identify the required code patterns and induce the required behavior to conduct an impactful exploit in a production environment are sufficiently high that the network-based exploit is not considered practicable at this time.

Extreme products deployed in virtual environments may be exposed to Spectre if the hosting environment is vulnerable.

Extreme continues to monitor and evaluate upstream vendor processor microcode and software updates. Patches or other mitigations may be deployed in future software updates.

Products Potentially Affected

 
   
ProductSpectre Vulnerability PresentSpectre Vulnerability ExposureStatus
ExtremeSwitching
X150NoNoNo further action planned
X250NoNoNo further action planned
X350NoNoNo further action planned
X430NoNoNo further action planned
X440NoNoNo further action planned
X440-G2NoNoNo further action planned
X450a/eNoNoNo further action planned.
X450-G2NoNoNo further action planned
X460NoNoNo further action planned
X460-G2NoNoNo further action planned
X480NoNoNo further action planned
X620NoNoNo further action planned
X650NoNoNo further action planned
X670NoNoNo further action planned
X670-G2NoNoNo further action planned
X690YesYesUnder Investigation. Further action pending.(1)
X770NoNoNo further action planned
X870YesYesUnder Investigation. Further action pending.(1)
BD 8800 (MSM-G8X, MSM-48)NoNoNo further action planned.
BD 8800/8900 (MSM-48c, 8500-MSM24, 8900-MSM128, 8900-MSM96)YesNegligible if suitable controls implemented on import and execution of user scripts.The vendor for the processor used on the BD 8800/8900 platforms has determined the processor is exposed to Spectre exploits and that no practicable remediations are available. Customers are advised to implement the suggested mitigations to control import and execution of user scripts. No further action planned.
BD-X8YesYesUnder Investigation. Further action pending.(1)
E4G-200NoNoNo further action planned
E4G-400NoNoNo further action planned
 
SecurestackNoNoNo further action planned
G-SeriesNoNoNo further action planned
A-SeriesNoNoNo further action planned
B-SeriesNoNoNo further action planned
C-SeriesNoNoNo further action planned
K-SeriesNoNoNo further action planned
S-SeriesNoNoNo further action planned
 
RXYesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
XMRYesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
MLX/MLXe (including line cards)YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
CES/CERYesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
VDXYesLimited. User cannot execute externally crafted programs under normal operating conditionsNo further action planned.
SLX9140/9240YesYesUnder investigation. Further action pending.(2)
SLX9540/9850 (including line cards)YesYesUnder investigation. Further action pending.(2)
 
VSP 4850GTS/GTS-PWR+YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
VSP 4450GSX/GSX-PWR+/HTXYesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
VSP 7254 XSQ/XTQYesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
VSP 8284XSQYesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
VSP 8404/8404CYesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
VSP 8608YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
 
ERS2500YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
ERS3500YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
ERS3600YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
ERS4500YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
ERS4800YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
ERS4900YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
ERS5500YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
ERS5600YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
ERS5900YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
VSP7000YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
APLS (Avaya Private Label Switching)
DSG8064YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
DSG9032YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
Legacy Modular
ERS 8300YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
ERS 8600YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
ERS 8800YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
VSP 9010/9012YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
ONA
Open Networking Adapter (for FE solution with vsp4k)YesNo. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
ADSP hardware appliances (SV-1252/ SV-3652/ NX-9500/ NX-9600)YesNo. User cannot execute externally crafted programs under normal operating conditionsUnder investigation
ADSP Virtual MachineExamine host environmentExamine host environmentCustomers recommended to harden host environment and install all security updates
Extreme Management SuiteYesYesUnder investigation
ExtremeLocationYesNo. User cannot execute externally crafted programs under normal operating conditionsUnder Investigation
ExtremeWireless No. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
ExtremeWireless WiNG No. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
T5 PowerBroadband No. User cannot execute externally crafted programs under normal operating conditionsNo further action planned
 
ExtremeCloudYesNo. User cannot execute externally crafted programs under normal operating conditionsUnder investigation
Fabric OrchestratorExamine host environmentExamine host environmentCustomers recommended to harden host environment and install all security updates
Visualization Performance and Fault Manager PlusExamine host environmentExamine host environmentCustomers recommended to harden host environment and install all security updates
Extreme AnalyticsExamine host environmentExamine host environmentCustomers recommended to harden host environment and install all security updates
Extreme products not explicitly identified above are still under investigation.

(1)Extreme is evaluating the stability and performance impacts of possible patches to the processor microcode and OS kernel. A final remediation plan is pending completion of testing. Due to the nature and scope of changes required to implement available patches, there are currently no plans to backport Spectre/Meltdown remediations to currently shipping releases. Customers are advised to implement the suggested mitigations to control import and execution of user scripts.

(2)Extreme is evaluating the stability and performance impacts of possible patches to the processor microcode. Extreme is also exploring methods for disabling user script execution. A final remediation plan is pending completion of testing.

Impact Details

 
Currently demonstrated Spectre exploits require execution of crafted code installed on the target device. While the circumstances for using the capability are rare, ExtremeSwitching and Data Center platforms support the import and execution of user scripts via local access only.

Exposure to impactful Spectre exploits may be reduced to a negligible level by strictly controlling imported scripts or altogether disabling the ability to execute imported scripts.

Mitigations customers may implement immediately focus on control of imported scripts:
  • Review all physical and procedural controls for access to impacted systems.
  • Review all firewall and other network access control equipment configuration to restrict network access to impacted devices.
  • Review impacted devices to ensure compliance with best security practices including changing default passwords, enforcement of suitably strong passwords for all user accounts, and deleting unused user accounts.
  • Review processes for examination, approval, and import of user scripts.
  • TACACS+ per-command authorization may be configured to block access to the "load script" and "run script" commands (EXOS)
User script execution may be disabled in EXOS by placing the system in FIPS mode. FIPS mode imposes various restrictions on the operation of the system. Please review FIPS mode operation to determine if it is appropriate.

Extreme is exploring methods for disabling user script execution for SLX platforms.

Repair Recommendations

 

Customers of Extreme products that provide a mechanism to execute third-party code are urged to exercise care in evaluating and authenticating any applications deployed on the Extreme platform.

Customers that deploy Extreme products in virtual environments are reminded to harden their virtual environment and install all security updates.

Customers are reminded to observe all security best practices in configuration of their systems to reduce exposure to unauthorized access.

Legal Notice

 
This advisory notice is provided on an “as is” basis and Extreme Networks makes no representations or warranties of any kind, expressly disclaiming the warranties of merchantability or fitness for a particular use. Use of the information provided herein or materials linked from this advisory notice is at your own risk. Extreme Networks reserves the right to change or update this document at any time, and expects to update this document as new information becomes available. The information provided herein is applicable to current Extreme Networks products identified herein and is not intended to be any representation of future functionality or compatibility with any third-party technologies referenced herein. This notice shall not change any contract or agreement that you have entered into with Extreme Networks.

Version Number

 

Feedback