
====================================================================

                             CERT-Renater

                 Note d'Information No. 2018/VULN007
_____________________________________________________________________

DATE                : 08/01/2018

HARDWARE PLATFORM(S): Cisco devices.

OPERATING SYSTEM(S): Cisco software.

=====================================================================
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
_____________________________________________________________________

Cisco Security Advisory: CPU Side-Channel Information Disclosure
Vulnerabilities

Advisory ID: cisco-sa-20180104-cpusidechannel

Revision: 1.0

For Public Release: 2018 January 4 22:20 GMT

Last Updated: 2018 January 4 22:20 GMT

CVE ID(s): CVE-2017-5715, CVE-2017-5753, CVE-2017-5754

+---------------------------------------------------------------------

Summary
=======
On January 3, 2018 researchers disclosed three vulnerabilities that take
advantage of the implementation of speculative execution of instructions
on many modern microprocessor architectures to perform side-channel
information disclosure attacks. These vulnerabilities could allow an
unprivileged local attacker, in specific circumstances, to read
privileged memory belonging to other processes or memory allocated to
the operating system kernel.

The first two vulnerabilities, CVE-2017-5753 and CVE-2017-5715,  are
collectively known as Spectre, the third vulnerability, CVE-2017-5754,
is known as Meltdown. The vulnerabilities are all variants of the same
attack and differ in the way the speculative execution is exploited.

In order to exploit any of these vulnerabilities, an attacker must be
able to run crafted code on an affected device.  The majority of Cisco
products are closed systems, which do not allow customers to run custom
code on the device. Although, the underlying CPU and OS combination in a
product may be affected by these vulnerabilities, the majority of Cisco
products are closed systems that do not allow customers to run custom
code on the device, and thus are not vulnerable. There is no vector to
exploit them. Only Cisco devices that are found to allow the customer to
execute their customized code side-by-side with the Cisco code on the
same microprocessor are considered vulnerable.

A Cisco product that may be deployed as a virtual machine or a
container, even while not being directly affected by any of these
vulnerabilities, could be the targeted by such attacks if the hosting
environment is vulnerable. Cisco recommends customers to harden their
virtual environment and to ensure that all security updates are installed.

Cisco will release software updates that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"]

==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================




