VN 2018-001 (CVE-2017-5715, CVE-2017-5753 - Spectre)
- Article Type:
- Vulnerability Notice
- Article Number:
- Last Modified:
"Spectre" is an attack that utilizes the speculative execution mechanism in modern processors to create a side-channel attack using the processor cache. Local execution of a crafted program is required to conduct the exploit.
The Spectre exploit has been demonstrated to communicate arbitrary kernel space memory contents to an unprivileged user process. However, the Spectre exploit may be utilized to create arbitrary illegal information flows between two cooperating subjects running crafted code.
Extreme products utilize a number of different processor architectures, some of which contain the Spectre vulnerability. Extreme products that do not provide a mechanism to execute third-party code are not exposed to Spectre exploits provided other unauthorized means are not employed to gain privileged access to the system to install code. Extreme products that offer a mechanism to execute third-party code are being assessed to determine the scope of exposure and available mitigations.
Extreme products deployed in virtual environments may be exposed to Spectre if the hosting environment is vulnerable.
Extreme continues to monitor and evaluate upstream vendor processor microcode and software updates. Patches or other mitigations may be deployed in future software updates.
See also: https://spectreattack.com/, https://www.kb.cert.org/vuls/id/584653
Products Potentially Affected
Extreme products not explicitly identified above are still under investigation.
This vulnerability notice will be updated as additional information becomes available.
Customers of Extreme products that provide a mechanism to execute third-party code are urged to exercise care in evaluating and authenticating any applications deployed on the Extreme platform.
Customers that deploy Extreme products in virtual environments are reminded to harden their virtual environment and install all security updates.
Customers are reminded to observe all security best practices in configuration of their systems to reduce exposure to unauthorized access.
This advisory notice is provided on an “as is” basis and Extreme Networks makes no representations or warranties of any kind, expressly disclaiming the warranties of merchantability or fitness for a particular use. Use of the information provided herein or materials linked from this advisory notice is at your own risk. Extreme Networks reserves the right to change or update this document at any time, and expects to update this document as new information becomes available. The information provided herein is applicable to current Extreme Networks products identified herein and is not intended to be any representation of future functionality or compatibility with any third-party technologies referenced herein. This notice shall not change any contract or agreement that you have entered into with Extreme Networks.