ESB-2018.1548.6 - UPDATE [Cisco] Multiple products: Access privileged data - Existing account 2018-06-14

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2018.1548.6
     CPU Side-Channel Information Disclosure Vulnerabilities: May 2018
                               14 June 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Multiple products
Publisher:         Cisco Systems
Operating System:  Cisco
Impact/Access:     Access Privileged Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-3640 CVE-2018-3639 

Reference:         ASB-2018.0121
                   ESB-2018.1545

Original Bulletin: 
   https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel

Revision History:  June 14 2018: Update to affected products from Cisco
                   June  6 2018: Update to affected products from Cisco
                   May  25 2018: Update to affected products from Cisco
                   May  24 2018: Update to affected products from Cisco
                   May  23 2018: Update to affected products from Cisco
                   May  22 2018: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

CPU Side-Channel Information Disclosure Vulnerabilities: May 2018

Medium
Advisory ID: cisco-sa-20180521-cpusidechannel
First Published: 2018 May 22 01:00 GMT
Last Updated:
2018 June 13 18:34 GMT
Version 1.9: Interim
Workarounds: No workarounds available

CVE-2018-3639
CVE-2018-3640

Summary

  o On May 21, 2018, researchers disclosed two vulnerabilities that take
    advantage of the implementation of speculative execution of instructions on
    many modern microprocessor architectures to perform side-channel
    information disclosure attacks. These vulnerabilities could allow an
    unprivileged, local attacker, in specific circumstances, to read privileged
    memory belonging to other processes.

    The first vulnerability, CVE-2018-3639, is known as Spectre Variant 4 or
    SpectreNG. The second vulnerability, CVE-2018-3640, is known as Spectre
    Variant 3a. Both of these attacks are variants of the attacks disclosed in
    January 2018 and leverage cache-timing attacks to infer any disclosed data.

    To exploit either of these vulnerabilities, an attacker must be able to run
    crafted or script code on an affected device. Although the underlying CPU
    and operating system combination in a product or service may be affected by
    these vulnerabilities, the majority of Cisco products are closed systems
    that do not allow customers to run custom code and are, therefore, not
    vulnerable. There is no vector to exploit them. Cisco products are
    considered potentially vulnerable only if they allow customers to execute
    custom code side-by-side with Cisco code on the same microprocessor.

    A Cisco product that may be deployed as a virtual machine or a container,
    even while not directly affected by any of these vulnerabilities, could be
    targeted by such attacks if the hosting environment is vulnerable. Cisco
    recommends that customers harden their virtual environments, tightly
    control user access, and ensure that all security updates are installed.
    Customers who are deploying products as a virtual device in multi-tenant
    hosting environments should ensure that the underlying hardware, as well as
    operating system or hypervisor, is patched against the vulnerabilities in
    question.

    Although Cisco cloud services are not directly affected by these
    vulnerabilities, the infrastructure on which they run may be impacted.
    Refer to the "Affected Products" section of this advisory for information
    about the impact of these vulnerabilities on Cisco cloud services.

    Cisco will release software updates that address these vulnerabilities.
    There are no workarounds that address these vulnerabilities.

    This advisory is available at the following link:
    https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel

Affected Products

  o Cisco is investigating its product line to determine which products and
    cloud services may be affected by these vulnerabilities. As the
    investigation progresses, Cisco will update this advisory with information
    about affected products and services, including the Cisco bug ID for each
    affected product or service.

    Any product or service not listed in the "Products Under Investigation" or
    "Vulnerable Products" section of this advisory is to be considered not
    vulnerable. The criteria for considering whether a product is vulnerable is
    explained in the "Summary" section of this advisory. Because this is an
    ongoing investigation, please be aware that products and services currently
    considered not vulnerable may subsequently be considered vulnerable as
    additional information becomes available.

    Products Under Investigation


    Network Application, Service, and Acceleration
      o Cisco DNA Center
      o Cisco vBond Orchestrator
      o Cisco vEdge 5000
      o Cisco vEdge Cloud
      o Cisco vManage NMS
      o Cisco vSmart Controller

    Routing and Switching - Enterprise and Service Provider
      o Cisco Catalyst 3650 Series Switches - IOx feature
      o Cisco Industrial Ethernet 4000 Series Switches (IOx feature)
      o Cisco Nexus 3000 Series Switches
      o Cisco Nexus 9000 Series Fabric Switches - ACI mode
      o Cisco Nexus 9000 Series Switches - Standalone, NX-OS mode

    Voice and Unified Communications Devices
      o Cisco Remote Expert Mobile

    Cisco Cloud Hosted Services
      o Cisco Spark
      o Cisco Threat Grid
      o Cisco WebEx Centers - Meeting Center, Training Center, Event Center,
        Support Center



    Vulnerable Products

    The following table lists Cisco products and cloud services that are
    affected by the vulnerabilities described in this advisory:

                  Product               Cisco Bug   Fixed Release Availability
                                            ID
                  Network Application, Service, and Acceleration
    Cisco Wide Area Application         CSCvj59144 Update to v6.x (Available)
    Services (WAAS)
                        Network Management and Provisioning
    Cisco Network Functions                        A fix is pending on upstream
    Virtualization Infrastructure       CSCvj59161 vendors.
    Software
              Routing and Switching - Enterprise and Service Provider
    Cisco 4000 Series Integrated                   A fix is pending on upstream
    Services Routers (IOS XE Open       CSCvj59152 vendors.
    Service Containers)
    Cisco 800 Series Industrial         CSCvj59153 A fix is pending on upstream
    Integrated Services Routers                    vendors.
    Cisco ASR 1000 Series Aggregation              A fix is pending on upstream
    Services Router with RP2 or RP3     CSCvj59152 vendors.
    (IOS XE Open Service Containers)
    Cisco ASR 1001-HX Series                       A fix is pending on upstream
    Aggregation Services Routers (IOS   CSCvj59152 vendors.
    XE Open Service Containers)
    Cisco ASR 1001-X Series Aggregation            A fix is pending on upstream
    Services Routers (IOS XE Open       CSCvj59152 vendors.
    Service Containers)
    Cisco ASR 1002-HX Series                       A fix is pending on upstream
    Aggregation Services Routers (IOS   CSCvj59152 vendors.
    XE Open Service Containers)
    Cisco ASR 1002-X Series Aggregation            A fix is pending on upstream
    Services Routers (IOS XE Open       CSCvj59152 vendors.
    Service Containers)
    Cisco ASR 9000 XR 64-bit Series     CSCvj59142 A fix is pending on upstream
    Routers                                        vendors.
    Cisco Application Policy            CSCvj59131
    Infrastructure Controller (APIC)
    Cisco CGR 1000 Compute Module (IOx  CSCvj59160 A fix is pending on upstream
    feature)                                       vendors.
    Cisco Catalyst 9300 Series Switches CSCvj59156 A fix is pending on upstream
    - IOx feature                                  vendors.
    Cisco Catalyst 9400 Series Switches CSCvj59157 A fix is pending on upstream
    - IOx feature                                  vendors.
    Cisco Catalyst 9500 Series Switches CSCvj59158 A fix is pending on upstream
    - IOx feature                                  vendors.
    Cisco Cloud Services Platform 2100  CSCvj63868
    Cisco Cloud Services Router 1000V              A fix is pending on upstream
    Series (IOS XE Open Service         CSCvj59152 vendors.
    Containers)
    Cisco NCS 1000 Series Routers       CSCvj59142 A fix is pending on upstream
                                                   vendors.
    Cisco NCS 5000 Series Routers       CSCvj59142 A fix is pending on upstream
                                                   vendors.
    Cisco NCS 5500 Series Routers       CSCvj59142 A fix is pending on upstream
                                                   vendors.
    Cisco Nexus 5000 Series Switches    CSCvj59138
    (OAC feature)
    Cisco Nexus 6000 Series Switches    CSCvj59135 A fix is pending on upstream
    (OAC feature)                                  vendors.
    Cisco Nexus 7000 Series Switches    CSCvj59135 A fix is pending on upstream
    (OAC feature, Feature Bash)                    vendors.
    Cisco Virtual Application Policy    CSCvj59131
    Infrastructure Controller (APIC)
    Cisco XRv 9000 Series Routers       CSCvj59142 A fix is pending on upstream
                                                   vendors.
                                 Unified Computing
    Cisco C880 M4 Server                CSCvj59127 A fix is pending on upstream
                                                   vendors.
    Cisco C880 M5 Server                CSCvj59127 A fix is pending on upstream
                                                   vendors.
    Cisco Enterprise Network Compute    CSCvj59121 A fix is pending on upstream
    System 5100 Series Servers                     vendors.
    Cisco Enterprise Network Compute    CSCvj59121 A fix is pending on upstream
    System 5400 Series Servers                     vendors.
    Cisco HyperFlex with VMWare         CSCvj59134
    Hypervisor
    Cisco UCS B-Series M2 Blade Servers CSCvj59301
                                                   Cisco UCS B-Series M3 Blade
                                                   Servers (Estimated Late June
    Cisco UCS B-Series M3 Blade Servers CSCvj54880 2018)
                                                   Cisco UCS C-Series M3 Rack
                                                   Servers (Estimated Late June
                                                   2018)
                                                   Cisco UCS B-Series M4 Blade
                                                   Servers (except B260
                                                   B460) (Estimated Late June
                                                   2018)
    Cisco UCS B-Series M4 Blade Servers CSCvj54187 Cisco UCS C-Series M4 Rack
    (except B260, B460)                            Servers (except C460)
                                                   (Estimated Late June 2018)
                                                   Cisco UCS S3260 M4 Storage
                                                   Server (Estimated Late June
                                                   2018)
                                                   Cisco UCS B-Series M5 Blade
                                                   Servers (Estimated Late June
    Cisco UCS B-Series M5 Blade Servers CSCvj59266 2018)
                                                   Cisco UCS C-Series M5 Rack
                                                   Servers (Estimated Late June
                                                   2018)
                                                   Cisco UCS B260 M4 Blade
                                                   Server (Estimated Late June
                                                   2018)
                                                   Cisco UCS B460 M4 Blade
    Cisco UCS B260 M4 Blade Server      CSCvj54847 Server (Estimated Late June
                                                   2018)
                                                   Cisco UCS C460 M4 Rack
                                                   Server (Estimated Late June
                                                   2018)
                                                   Cisco UCS B260 M4 Blade
                                                   Server (Estimated Late June
                                                   2018)
                                                   Cisco UCS B460 M4 Blade
    Cisco UCS B460 M4 Blade Server      CSCvj54847 Server (Estimated Late June
                                                   2018)
                                                   Cisco UCS C460 M4 Rack
                                                   Server (Estimated Late June
                                                   2018)
    Cisco UCS C-Series M2 Rack Servers  CSCvj59301
                                                   Cisco UCS B-Series M3 Blade
                                                   Servers (Estimated Late June
    Cisco UCS C-Series M3 Rack Servers  CSCvj54880 2018)
                                                   Cisco UCS C-Series M3 Rack
                                                   Servers (Estimated Late June
                                                   2018)
                                                   Cisco UCS B-Series M4 Blade
                                                   Servers (except B260
                                                   B460) (Estimated Late June
                                                   2018)
    Cisco UCS C-Series M4 Rack Servers  CSCvj54187 Cisco UCS C-Series M4 Rack
    (except C460) ^1                               Servers (except C460)
                                                   (Estimated Late June 2018)
                                                   Cisco UCS S3260 M4 Storage
                                                   Server (Estimated Late June
                                                   2018)
                                                   Cisco UCS B-Series M5 Blade
                                                   Servers (Estimated Late June
    Cisco UCS C-Series M5 Rack Servers  CSCvj59266 2018)
    ^1                                             Cisco UCS C-Series M5 Rack
                                                   Servers (Estimated Late June
                                                   2018)
                                                   Cisco UCS B260 M4 Blade
                                                   Server (Estimated Late June
                                                   2018)
                                                   Cisco UCS B460 M4 Blade
    Cisco UCS C460 M4 Rack Server       CSCvj54847 Server (Estimated Late June
                                                   2018)
                                                   Cisco UCS C460 M4 Rack
                                                   Server (Estimated Late June
                                                   2018)
    Cisco UCS E-Series M2 Servers       CSCvj59121 A fix is pending on upstream
                                                   vendors.
    Cisco UCS E-Series M3 Servers       CSCvj59121 A fix is pending on upstream
                                                   vendors.
                                                   Cisco UCS B-Series M4 Blade
                                                   Servers (except B260
                                                   B460) (Estimated Late June
                                                   2018)
    Cisco UCS S3260 M4 Storage Server   CSCvj54187 Cisco UCS C-Series M4 Rack
                                                   Servers (except C460)
                                                   (Estimated Late June 2018)
                                                   Cisco UCS S3260 M4 Storage
                                                   Server (Estimated Late June
                                                   2018)
    Cisco Virtual Infrastructure        CSCvj75271
    Manager
                            Cisco Cloud Hosted Services
    Cisco Metacloud                     CSCvj59149 A fix is pending on upstream
                                                   vendors.


    ^1 Cisco UCS M4 and M5 Rack Servers are used as part of the Cisco HyperFlex
    Solution.

    Products Confirmed Not Vulnerable

    The following Cisco products are considered not vulnerable to Spectre
    Variant 3a or Spectre Variant 4. Specific models in these product families
    may be affected and will be explicitly listed in the preceding "Vulnerable
    Products" section.

    Routers

    Branch Routers

      o Cisco 4000 Series Integrated Services Routers
      o Cisco 1900 Series Integrated Services Routers
      o Cisco 1800 Series Integrated Services Routers
      o Cisco 1000 Series Integrated Services Routers
      o Cisco 800 Series Routers

    Data Center Interconnect Platforms

      o Cisco ASR 1000 Series Aggregation Services Routers
      o Cisco Carrier Routing System
      o Cisco Catalyst 6500 Series Switches

    Industrial Routers

      o Cisco 2000 Series Connected Grid Routers
      o Cisco 1000 Series Connected Grid Routers
      o Cisco 900 Series Industrial Routers
      o Cisco 800 Series Industrial Integrated Services Routers
      o Cisco 500 Series WPAN Industrial Routers
      o Cisco Wireless Gateway for LoRaWAN

    Cloud Networking Services

      o Cisco Cloud Services Router 1000V Series

    Mobile Internet Routers

      o Cisco 5900 Series Embedded Services Routers
      o Cisco MWR 2900 Series Mobile Wireless Routers

    Service Provider Core Routers

      o Cisco Carrier Routing System
      o Cisco Network Convergence System 6000 Series Routers

    Service Provider Edge Routers

      o Cisco 12000 Series Routers
      o Cisco ASR 1000 Series Aggregation Services Routers
      o Cisco ASR 920 Series Aggregation Services Router
      o Cisco ASR 901 Series Aggregation Services Routers
      o Cisco ASR 900 Series Aggregation Services Routers
      o Cisco XR 12000 Series Router
      o Cisco Network Convergence System 500 Series Routers

    Small Business Routers

      o Cisco 1900 Series Integrated Services Routers
      o Cisco 800 Series Routers
      o Cisco Small Business RV Series Routers

    Virtual Routers

      o Cisco Cloud Services Router 1000V Series
      o Cisco WAN Aggregation and Internet Edge Routers
      o Cisco ASR 1000 Series Aggregation Services Routers
      o Cisco Catalyst 6500 Series Switches

    WAN Optimization

      o Cisco Virtual Wide Area Application Services (vWAAS)
      o Cisco Wide Area Application Services (WAAS) Express
      o Cisco Wide Area Application Services (WAAS) Software

    Switches

    Blade Switches

      o Cisco Blade Switches for Dell
      o Cisco Blade Switches for FSC
      o Cisco Blade Switches for HP
      o Cisco Nexus 4000 Series Switches
      o Cisco Switch Modules for IBM
      o Cisco SFS Solutions for Blade Switches
      o Cisco SFS Solution for Dell

    Campus LAN Switches - Access

      o Cisco Catalyst 9400 Series Switches
      o Cisco Catalyst 9300 Series Switches
      o Cisco Catalyst 4500 Series Switches
      o Cisco Catalyst 3850 Series Switches
      o Cisco Catalyst 3750 Series Switches
      o Cisco Catalyst 3650 Series Switches
      o Cisco Catalyst 2960-L Series Switches
      o Cisco Catalyst 2960-Plus Series Switches
      o Cisco Catalyst 2960-X Series Switches
      o Cisco Edge Series
      o Cisco Meraki Cloud Managed Switches
      o Cisco Redundant Power Systems

    Campus LAN Switches - Core and Distribution

      o Cisco Catalyst 9500 Series Switches
      o Cisco Catalyst 6800 Series Switches
      o Cisco Catalyst 6500 Series Switches
      o Cisco Catalyst 6500 Virtual Switching System 1440
      o Cisco Catalyst 4900 Series Switches
      o Cisco Catalyst 4500 Series Switches
      o Cisco Catalyst 4500-X Series Switches
      o Cisco Catalyst 3850 Series Switches
      o Cisco Nexus 7000 Series Switches

    Campus LAN Switches - Digital Building

      o Cisco Catalyst 3560-CX Series Switches
      o Cisco Catalyst 2960-C Series Switches
      o Cisco Catalyst 2960-CX Series Switches
      o Cisco Catalyst 2960-L Series Switches
      o Cisco Catalyst Digital Building Series Switches

    Data Center Switches

      o Cisco Nexus 2000 Series Fabric Extenders
      o Cisco R Series Racks
      o Cisco RP Series Power Distribution Units
      o Cisco Data Center Network Management
      o Cisco Data Center Network Manager
      o Cisco Fabric Manager
      o Cisco Data Center Switches with Cisco IOS Software
      o Cisco Catalyst 6500 Series Switches
      o Cisco Catalyst 4900 Series Switches
      o Cisco Energy and Asset Management
      o Cisco Asset Management Suite
      o Cisco Energy Management Suite

    Industrial Ethernet Switches

      o Cisco 2500 Series Connected Grid Switches
      o Cisco Embedded Service 2020 Series Switches
      o Cisco Industrial Ethernet 5000 Series Switches
      o Cisco Industrial Ethernet 4010 Series Switches
      o Cisco Industrial Ethernet 4000 Series Switches
      o Cisco Industrial Ethernet 3010 Series Switches
      o Cisco Industrial Ethernet 3000 Series Switches
      o Cisco Industrial Ethernet 2000 Series Switches
      o Cisco Industrial Ethernet 2000U Series Switches
      o Cisco Industrial Ethernet 1000 Series Switches

    InfiniBand Switches

      o Cisco SFS 7000 Series InfiniBand Server Switches
      o Cisco SFS 3500 Series Multifabric Server Switches
      o Cisco SFS 3000 Series Multifabric Server Switches

     LAN Switches - Small Business

      o Cisco 550X Series Stackable Managed Switches
      o Cisco 350 Series Managed Switches
      o Cisco 350X Series Stackable Managed Switches
      o Cisco 250 Series Smart Switches
      o Cisco 220 Series Smart Switches
      o Cisco ESW2 Series Advanced Switches
      o Cisco Small Business 300 Series Managed Switches
      o Cisco Small Business 200 Series Smart Switches
      o Cisco Small Business 110 Series Unmanaged Switches
      o Cisco Small Business Smart Switches
      o Cisco Small Business Stackable Managed Switches
      o Cisco Small Business Unmanaged Switches

    Service Provider Switches - Aggregation

      o Cisco Catalyst 6500 Series Switches
      o Cisco Catalyst 4500 Series Switches
      o Cisco ME 4900 Series Ethernet Switches
      o Cisco ME 3800X Series Carrier Ethernet Switch Routers

    Service Provider Switches - Ethernet Access

      o Cisco Catalyst 3750 Metro Series Switches
      o Cisco ME 3600X Series Ethernet Access Switches
      o Cisco ME 3400 Series Ethernet Access Switches
      o Cisco ME 3400E Series Ethernet Access Switches
      o Cisco ME 1200 Series Carrier Ethernet Access Devices
      o Cisco Small Business Gigabit SP Switches

    Virtual Networking

      o Cisco Application Centric Infrastructure Virtual Edge
      o Cisco Application Virtual Switch
      o Cisco Cloud Services Platform 2100
      o Cisco Nexus 1000V InterCloud
      o Cisco Nexus 1000V Switch for KVM
      o Cisco Nexus 1000V Switch for Microsoft Hyper-V
      o Cisco Nexus 1000V Switch for VMware vSphere

    Cloud Networking Services

      o Cisco Prime Virtual Network Analysis Module (vNAM)
      o Cisco Virtual Security Gateway
      o Cisco Virtual Wide Area Application Services (vWAAS)

    WAN Switches

      o Cisco IGX 8400 Series Switches

    MGX Switches

      o Cisco MGX 8900 Series Switches
      o Cisco MGX 8850 Software
      o Cisco MGX 8800 Series Switches
      o Cisco MGX 8250 Software
      o Cisco MGX 8200 Series Edge Concentrators

    Wireless

    Indoor Access Points

      o Cisco Aironet 1815 Series Access Points
      o Cisco Aironet 2800 Series Access Points
      o Cisco Aironet 3800 Series Access Points
      o Cisco Aironet 4800 Access Point

    Outdoor and Industrial Access Points

      o Cisco Aironet 1540 Series Access Points
      o Cisco Aironet 1560 Series Access Points
      o Cisco Aironet 1570 Series Access Points

    Wireless LAN Controllers

      o Cisco 3504 Wireless LAN Controller
      o Cisco 5520 Wireless LAN Controller
      o Cisco 8540 Wireless LAN Controller
      o Cisco Virtual Wireless Controller
      o Cisco Meraki Cloud Managed Access Points

    Security

    Cisco Cloud-Hosted Products

      o Cisco AMP family of products and endpoint protection clients
      o Cisco Cloud Security
      o Cisco Cloudlock
      o Cisco Umbrella

    Email Security

      o Cisco Content Security Management Appliance
      o Cisco Email Security
      o Cisco Email Encryption
      o Cisco Email Encryption
      o Cisco Registered Envelope Service

    Firewalls

      o Cisco 3000 Series Industrial Security Appliances (ISA)
      o Cisco Meraki Cloud Managed Security Appliances
      o Cisco Adaptive Security Appliances (ASA)
      o Cisco Adaptive Security Virtual Appliance (ASAv)

    Firewall Management

      o Cisco Adaptive Security Device Manager
      o Cisco Firepower Device Manager
      o Cisco Firepower Management Center
      o Cisco Security Manager
    Next-Generation Firewalls (NGFW)
      o Cisco ASA 5500-X with FirePOWER Services
      o Cisco Firepower 9000 Series
      o Cisco Firepower 4100 Series
      o Cisco Firepower 2100 Series

    Network Security

      o Cisco VPN Internal Service Module for ISR G2

    Network Visibility and Segmentation

      o Cisco ISE Passive Identity Connector
      o Cisco Identity Services Engine (ISE)
      o Cisco Security Packet Analyzer
      o Cisco Stealthwatch Cloud
      o Cisco Stealthwatch Enterprise

    Next-Generation Intrusion Prevention System (NGIPS)

      o Cisco FirePOWER 8000 Series Appliances
      o Cisco FirePOWER 7000 Series Appliances

    Security Management

      o Cisco Firepower Management Center
      o Cisco Adaptive Security Device Manager
      o Cisco Content Security Management Appliance
      o Cisco Defense Orchestrator

    Unified Communications

      o Cisco Spark
      o Cisco Unified Communications Manager
      o Cisco Business Edition 6000 - 100x80
      o Cisco Business Edition 6000
      o Cisco Jabber - 100x80
      o Cisco Jabber
      o Cisco Expressway

    Customer Care

      o Cisco Unified Contact Center Express
      o Cisco Unified Contact Center Enterprise
      o Cisco Finesse
      o Cisco MediaSense

    Conferencing

      o Cisco Meeting Server
      o Cisco WebEx Meeting Center
      o Cisco WebEx Meetings Server
      o Cisco TelePresence Management Suite
      o Cisco TelePresence Server
      o Cisco TelePresence Conductor

    Collaboration Endpoints

      o Cisco 8800 Series IP Phones
      o Cisco 7800 Series IP Phones
      o Cisco 6900 Series IP Phones
      o Cisco 3900 Series SIP Phones
      o Cisco Desktop Collaboration Experience - DX600 Series
      o Cisco DX Series
      o Cisco TelePresence SX10 Quick Set
      o Cisco TelePresence MX Series - 100x80
      o Cisco TelePresence MX Series
      o Cisco TelePresence IX5000 Series

    Cisco Unified Computing Management Platforms

      o Cisco Intersight
      o Cisco UCS Manager
      o Cisco UCS Central
      o Cisco UCS Director
      o Cisco UCS Performance Manager

    IP Video

      o Cisco Access Edge
      o Cisco Cable Modem Termination Systems (CMTSs)
      o Cisco RF Switches
      o Cisco cBR Series Converged Broadband Routers
      o Cisco uBR10000 Series Universal Broadband Routers
      o Cisco uBR7225VXR Universal Broadband Routers
      o Cisco uBR7200 Series Universal Broadband Routers

    No other Cisco IP Video products are known to be affected.

    Internet of Things (IoT)

      o Cisco Jasper Control Center
      o Cisco IoT Management
      o Cisco Application Enablement
      o Cisco IoT Security
      o Cisco Kinetic
      o Cisco Extended Enterprise


    Products Confirmed Not Vulnerable: Addendum

    The following products have been moved to this section from the "Products
    Under Investigation" section:

    Network Application, Service, and Acceleration
      o Cisco 500 Series WPAN Industrial Routers (IOx feature)

    Network Management and Provisioning
      o Cisco Evolved Programmable Network Manager
      o Cisco Meeting Server

    Routing and Switching - Enterprise and Service Provider
      o Cisco 1000 Series Connected Grid Routers
      o Cisco Nexus 4000 Series Blade Switches
      o Cisco c800 Series Integrated Services Routers

    Wireless
      o Cisco Wireless Gateway for LoRaWAN

    Cisco Cloud Hosted Services
      o Cisco Cloudlock
      o Cisco Umbrella


Details

  o Modern CPU Speculative Store Bypass Information Disclosure Vulnerability

    A vulnerability due to the design of most modern CPUs could allow a local
    attacker to access sensitive information on a targeted system.

    The vulnerability is due to improper implementation of the speculative
    execution of instructions by the affected software. This vulnerability can
    be triggered by causing the CPU to attempt to perform a speculative memory
    read before currently queued memory writes are completed. An attacker could
    exploit this vulnerability by executing arbitrary code and performing a
    side-channel attack on the cache of the targeted system. A successful
    exploit could allow the attacker to read sensitive memory information.

    This vulnerability has been assigned the following CVE ID: CVE-2018-3639

    Modern CPU Rogue System Register Read Information Disclosure Vulnerability

    A vulnerability due to the design of most modern CPUs could allow a local
    attacker to access sensitive information on a targeted system.

    The vulnerability is due to improper implementation of the speculative
    execution of instructions by the affected software. This vulnerability can
    by triggered by causing an affected platform to perform speculative reads
    of system registers. An attacker could exploit this vulnerability by
    executing arbitrary code and performing a side-channel attack on the cache
    of the targeted system. A successful exploit could allow the attacker to
    read sensitive memory information.

    This vulnerability has been assigned the following CVE ID: CVE-2018-3640

Workarounds

  o There are no workarounds that address these vulnerabilities.

Fixed Software

  o For information about fixed software releases, consult the Cisco bug ID(s)
    at the top of this advisory.

    When considering software upgrades, customers are advised to regularly
    consult the advisories for Cisco products, which are available from the
    Cisco Security Advisories and Alerts page, to determine exposure and a
    complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded
    contain sufficient memory and confirm that current hardware and software
    configurations will continue to be supported properly by the new release.
    If the information is not clear, customers are advised to contact the Cisco
    Technical Assistance Center (TAC) or their contracted maintenance
    providers.

Exploitation and Public Announcements

  o The Cisco Product Security Incident Response Team (PSIRT) is not aware of
    any public announcements or malicious use of the vulnerabilities that are
    described in this advisory.

Source

  o CVE ID CVE-2018-3639 was reported to Intel by Jann Horn of Google Project
    Zero (GPZ) and Ken Johnson of the Microsoft Security Response Center
    (MSRC).

    CVE ID CVE-2018-3640 was reported to Intel by Zdenek Sojka, Rudolf Marek,
    and Alex Zuepke from SYSGO AG.

Cisco Security Vulnerability Policy

  o To learn about Cisco security vulnerability disclosure policies and
    publications, see the Security Vulnerability Policy. This document also
    contains instructions for obtaining fixed software and receiving security
    vulnerability information from Cisco.

Subscribe to Cisco Security Notifications

  o Subscribe

URL

  o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel

Revision History

  o +---------+---------------------------+----------+---------+--------------+
    | Version |        Description        | Section  | Status  |     Date     |
    +---------+---------------------------+----------+---------+--------------+
    |         | Updated Products Under    |          |         |              |
    | 1.9     | Investigation, Vulnerable | Affected | Interim | 2018-June-13 |
    |         | Products, and Confirmed   | Products |         |              |
    |         | Not Vulnerable.           |          |         |              |
    +---------+---------------------------+----------+---------+--------------+
    |         | Updated information about |          |         |              |
    |         | the status of fixes for   | Affected |         |              |
    | 1.8     | multiple products listed  | Products | Interim | 2018-June-08 |
    |         | in the Affected Products  |          |         |              |
    |         | table.                    |          |         |              |
    +---------+---------------------------+----------+---------+--------------+
    |         | Updated information about |          |         |              |
    |         | the status of fixes for   | Affected |         |              |
    | 1.7     | multiple products listed  | Products | Interim | 2018-June-04 |
    |         | in the Affected Products  |          |         |              |
    |         | table.                    |          |         |              |
    +---------+---------------------------+----------+---------+--------------+
    |         | In the Affected Products  |          |         |              |
    |         | section, moved Cisco 880  |          |         |              |
    |         | M2 and M3 Servers to the  |          |         |              |
    | 1.6     | Vulnerable Products       | Affected | Interim | 2018-June-01 |
    |         | section. Fix status       | Products |         |              |
    |         | information has been      |          |         |              |
    |         | updated for multiple      |          |         |              |
    |         | products.                 |          |         |              |
    +---------+---------------------------+----------+---------+--------------+
    |         | In the Affected Products  |          |         |              |
    |         | section, multiple         |          |         |              |
    |         | products were moved from  | Affected |         |              |
    | 1.5     | Under Investigation to    | Products | Interim | 2018-May-31  |
    |         | Vulnerable. Cisco DNA     |          |         |              |
    |         | Center was added to Under |          |         |              |
    |         | Investigation.            |          |         |              |
    +---------+---------------------------+----------+---------+--------------+
    |         | In the Affected Products  |          |         |              |
    |         | section, multiple         | Affected |         |              |
    | 1.4     | products were moved from  | Products | Interim | 2018-May-29  |
    |         | Under Investigation to    |          |         |              |
    |         | Vulnerable.               |          |         |              |
    +---------+---------------------------+----------+---------+--------------+
    |         | In the Affected Products  |          |         |              |
    |         | section, moved Cisco      |          |         |              |
    |         | Evolved Programmable      | Affected |         |              |
    | 1.3     | Network Manager from      | Products | Interim | 2018-May-24  |
    |         | Under Investigation to    |          |         |              |
    |         | Products Confirmed Not    |          |         |              |
    |         | Vulnerable.               |          |         |              |
    +---------+---------------------------+----------+---------+--------------+
    |         | In the Affected Products  |          |         |              |
    |         | section, multiple         | Affected |         |              |
    | 1.2     | products were moved from  | Products | Interim | 2018-May-23  |
    |         | Under Investigation to    |          |         |              |
    |         | Vulnerable.               |          |         |              |
    +---------+---------------------------+----------+---------+--------------+
    |         | In the Affected Products  |          |         |              |
    |         | section, multiple         |          |         |              |
    | 1.1     | products were moved from  | Affected | Interim | 2018-May-22  |
    |         | Under Investigation to    | Products |         |              |
    |         | Vulnerable or Confirmed   |          |         |              |
    |         | Not Vulnerable            |          |         |              |
    +---------+---------------------------+----------+---------+--------------+
    | 1.0     | Initial public release.   | -        | Interim | 2018-May-22  |
    +---------+---------------------------+----------+---------+--------------+

Legal Disclaimer

  o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND
    OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR
    FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT
    OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES
    THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. CISCO EXPECTS TO
    UPDATE THIS DOCUMENT AS NEW INFORMATION BECOMES AVAILABLE.

    A standalone copy or paraphrase of the text of this document that omits the
    distribution URL is an uncontrolled copy and may lack important information
    or contain factual errors. The information in this document is intended for
    end users of Cisco products.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=f8bF
-----END PGP SIGNATURE-----

« Back to bulletins