Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2018.2352.5 CPU Side-Channel Information Disclosure Vulnerabilities: August 2018 3 September 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco products Publisher: Cisco Systems Operating System: Cisco Impact/Access: Access Privileged Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2018-3646 CVE-2018-3620 CVE-2018-3615 Reference: ESB-2018.2344 ESB-2018.2343 ESB-2018.2348.2 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel Revision History: September 3 2018: Updated affected products section August 30 2018: Updated affected products section August 23 2018: Updated affected products section August 20 2018: Updated affected products section August 15 2018: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- CPU Side-Channel Information Disclosure Vulnerabilities: August 2018 Medium Advisory ID: cisco-sa-20180814-cpusidechannel First Published: 2018 August 14 17:00 GMT Last Updated: 2018 August 31 20:37 GMT Version 1.4: Interim Workarounds: No workarounds available CVE-2018-3615 CVE-2018-3620 CVE-2018-3646 Summary o On August 14th, 2018, three vulnerabilities were disclosed by Intel and security researchers that leverage a speculative execution side-channel method referred to as L1 Terminal Fault (L1TF) that affects modern Intel microprocessors. These vulnerabilities could allow an unprivileged, local attacker, in specific circumstances, to read privileged memory belonging to other processes. The first vulnerability, CVE-2018-3615, affects Intel SGX technology and is referred to by the researchers who discovered it as foreshadow. This vulnerability is not known to affect any Cisco devices as the Cisco devices do not utilize Intel SGX technology. The second vulnerability, CVE-2018-3620, and the third vulnerability, CVE-2018-3646, are referred to as L1 Terminal Fault attacks by Intel. These two vulnerabilities affect multi-core processors that leverage Intel Hyper-Threading technology supporting Operating System, System Management Mode, and Virtualized workloads. Like the previously disclosed Spectre vulnerabilities, all three new vulnerabilities leverage cache-timing attacks to infer any disclosed data. To exploit any of these vulnerabilities, an attacker must be able to run crafted or script code on an affected device. Although the underlying CPU and operating system combination in a product or service may be affected by these vulnerabilities, the majority of Cisco products are closed systems that do not allow customers to run custom code and are, therefore, not vulnerable. There is no vector from which to exploit them. Cisco products are considered potentially vulnerable only if they allow customers to execute custom code side-by-side with Cisco code on the same microprocessor. A Cisco product that may be deployed as a virtual machine or a container, even while not directly affected by any of these vulnerabilities, could be targeted by such attacks if the hosting environment is vulnerable. Cisco recommends that customers harden their virtual environments, tightly control user access, and ensure that all security updates are installed. Customers who are deploying products as a virtual device in multi-tenant hosting environments should ensure that the underlying hardware, as well as the operating system or hypervisor, is patched against the vulnerabilities in question. Although Cisco cloud services are not directly affected by these vulnerabilities, the infrastructure on which they run may be impacted. See the Affected Products section of this advisory for information about the impact of these vulnerabilities on Cisco cloud services. Cisco will release software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20180814-cpusidechannel Affected Products o Any product or service not listed in the Vulnerable Products section of this advisory is to be considered not vulnerable. The criteria for considering whether a product is vulnerable is explained in the Summary section of this advisory. Because this is an ongoing investigation, please be aware that products and services currently considered not vulnerable may subsequently be considered vulnerable as additional information becomes available. Products Under Investigation The following products are under active investigation to determine whether they are affected by the vulnerability that is described in this advisory: Network Application, Service, and Acceleration - Cisco Virtual Wide Area Application Services (vWAAS) - Cisco Wide Area Application Services (WAAS) Express - Cisco Wide Area Application Services (WAAS) Software Network and Content Security Devices - Cisco FireSIGHT System Routing and Switching - Enterprise and Service Provider - Cisco ASR 9000 XR 64-bit Series Routers - Cisco Industrial Ethernet 4000 Series Switches (IOx feature) - Cisco NCS 1000 Series Routers - Cisco NCS 5000 Series Routers - Cisco NCS 5500 Series Routers - Cisco XRv 9000 Series Routers Vulnerable Products Product Cisco Bug Fixed Release Availability ID Network Application, Service, and Acceleration Cisco Cloud Services Platform CSCvm02914 2100 Routing and Switching - Enterprise and Service Provider Cisco 4000 Series Integrated Services Routers (IOS XE Open CSCvm02977 Service Containers) Cisco ASR 1000 Series Aggregation Services Router with CSCvm02977 RP2 or RP3 (IOS XE Open Service Containers) Cisco ASR 1001-HX Series Aggregation Services Routers CSCvm02977 (IOS XE Open Service Containers) Cisco ASR 1001-X Series Aggregation Services Routers CSCvm02977 (IOS XE Open Service Containers) Cisco ASR 1002-HX Series Aggregation Services Routers CSCvm02977 (IOS XE Open Service Containers) Cisco ASR 1002-X Series Aggregation Services Routers CSCvm02977 (IOS XE Open Service Containers) Cisco Cloud Services Router 1000V Series (IOS XE Open CSCvm02977 Service Containers) Cisco Nexus 3000 Series Switches CSCvm02926 Cisco Nexus 3500 Series Switches CSCvm02929 Cisco Nexus 5000 Series Switches CSCvm02930 Cisco Nexus 7000 Series Switches CSCvm02924 Cisco Nexus 9000 Series Switches CSCvm02926 - Standalone, NX-OS mode Unified Computing Cisco C880 M4 Server CSCvm02911 Cisco C880 M5 Server CSCvm02911 Cisco Enterprise NFV CSCvm02987 Infrastructure Software (NFVIS) Cisco HyperFlex System CSCvm02920 Cisco UCS B-Series M2 Blade Servers - Managed UCS Manager 2.2(8l) - (Available) UCS Manager 3.2(3g) - Cisco UCS B-Series M2 Blade CSCvm02934 (Available) Servers Cisco UCS C-Series M2 Rack Servers - Managed UCS Manager 2.2(8l) - (Available) Cisco IMC 1.4(3z09)(Available) Cisco IMC 1.5(9f)(Available) Cisco UCS B-Series M3 Blade Servers - Managed UCS Manager 2.2(8l) (Available) UCS Manager 3.1(3j) (Available) UCS Manager 3.2(3g) (Available) UCS C-Series M3 Rack Servers - Cisco UCS B-Series M3 Blade Managed Servers - Managed CSCvm03356 UCS Manager 3.2(3g) - (Available) UCS Manager 3.1(3j) - (Available) UCS Manager 2.2(8l) - (Available) Cisco IMC 3.0(4i) - (Available) Cisco IMC 2.0(9o) - (Available) Cisco UCS B-Series M4 Blade Servers (except B260 B460) UCS Manager 3.2(3e) - (Available) UCS Manager 3.1(3j) - (Available) UCS Manager 2.2(8l) - (Available) Cisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available) Cisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available) Cisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available) Cisco UCS S3260 M4 Storage Server - UCS Manager 3.1(3j) - (Available) Cisco UCS B-Series M4 Blade CSCvm03351 Cisco UCS C-Series M4 Rack Servers (except B260, B460) Servers Cisco IMC 3.0(4e) - (Available) Cisco IMC 2.0(10k) - (Available) Cisco UCS S3260 M4 Storage Server UCS Manager 3.2(3e) - (Available) UCS Manager 3.1(3j) - (Available) UCS Manager 2.2(8l) - (Available) Cisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available) Cisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available) Cisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available) Cisco UCS S3260 M4 Storage Cisco UCS B-Series M5 Blade Servers UCS Manager 3.2(3g) - (Available) Cisco UCS B-Series M5 Blade Cisco UCS C-Series M5 Rack Servers CSCvm03339 Servers -Standalone Cisco IMC 3.1(2i) - (Available) Cisco UCS C-Series M5 Rack Servers - Managed UCS Manager 3.2(3g) - (Available) Cisco UCS B-Series M2 Blade Servers - Managed UCS Manager 2.2(8l) - (Available) UCS Manager 3.2(3g) - Cisco UCS C-Series M2 Rack CSCvm02934 (Available) Servers Cisco UCS C-Series M2 Rack Servers - Managed UCS Manager 2.2(8l) - (Available) Cisco IMC 1.4(3z09)(Available) Cisco IMC 1.5(9f)(Available) Cisco UCS B-Series M3 Blade Servers - Managed UCS Manager 2.2(8l) (Available) UCS Manager 3.1(3j) (Available) UCS Manager 3.2(3g) (Available) UCS C-Series M3 Rack Servers - Cisco UCS C-Series M3 Rack Managed Servers - Managed CSCvm03356 UCS Manager 3.2(3g) - (Available) UCS Manager 3.1(3j) - (Available) UCS Manager 2.2(8l) - (Available) Cisco IMC 3.0(4i) - (Available) Cisco IMC 2.0(9o) - (Available) UCS Manager 3.2(3g) - (Available) UCS Manager 3.1(3j) - Cisco UCS C-Series M3 Rack CSCvm03357 (Available) Servers - Standalone UCS Manager 2.2(8l) - (Available) Cisco IMC 3.0(4i) - (Available) Cisco IMC 2.0(9o) - (Available) Cisco UCS C-Series M4 Rack Cisco IMC 3.0(4e) - (Available) Servers (except C460) - CSCvm03353 Cisco IMC 2.0(10k) - Standalone ^1 (Available) Cisco UCS B-Series M4 Blade Servers (except B260 B460) UCS Manager 3.2(3e) - (Available) UCS Manager 3.1(3j) - (Available) UCS Manager 2.2(8l) - (Available) Cisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available) Cisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available) Cisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available) Cisco UCS S3260 M4 Storage Server - UCS Manager 3.1(3j) - Cisco UCS C-Series M4 Rack (Available) Servers (except C460) -Managed ^ CSCvm03351 Cisco UCS C-Series M4 Rack 1 Servers Cisco IMC 3.0(4e) - (Available) Cisco IMC 2.0(10k) - (Available) Cisco UCS S3260 M4 Storage Server UCS Manager 3.2(3e) - (Available) UCS Manager 3.1(3j) - (Available) UCS Manager 2.2(8l) - (Available) Cisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available) Cisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available) Cisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available) Cisco UCS S3260 M4 Storage Cisco UCS B-Series M5 Blade Servers UCS Manager 3.2(3g) - (Available) Cisco UCS C-Series M5 Rack Cisco UCS C-Series M5 Rack Servers - Managed ^1 CSCvm03339 Servers -Standalone Cisco IMC 3.1(2i) - (Available) Cisco UCS C-Series M5 Rack Servers - Managed UCS Manager 3.2(3g) - (Available) Cisco UCS B-Series M5 Blade Servers Cisco UCS C-Series M5 Rack UCS Manager 3.2(3g) - Servers -Standalone ^1 CSCvm03347 (Available) Cisco UCS C-Series M5 Rack Servers -Standalone Cisco IMC 3.1(2i) - (Available) Cisco UCS E-Series Servers CSCvm02902 Cisco UCS B-Series M4 Blade Servers (except B260 B460) UCS Manager 3.2(3e) - (Available) UCS Manager 3.1(3j) - (Available) UCS Manager 2.2(8l) - (Available) Cisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available) Cisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available) Cisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available) Cisco UCS S3260 M4 Storage Server - UCS Manager 3.1(3j) - (Available) Cisco UCS S3260 M4 Storage CSCvm03351 Cisco UCS C-Series M4 Rack Server Servers Cisco IMC 3.0(4e) - (Available) Cisco IMC 2.0(10k) - (Available) Cisco UCS S3260 M4 Storage Server UCS Manager 3.2(3e) - (Available) UCS Manager 3.1(3j) - (Available) UCS Manager 2.2(8l) - (Available) Cisco UCS C-Series M4 Rack Servers - Managed (except C460) - UCS Manager 3.2(3e) - (Available) Cisco UCS S3260 M4 Storage Server - Managed - UCS Manager 3.2(3e) - (Available) Cisco UCS S3260 M4 Storage Server - Standalone - Cisco IMC 3.0(4e) - (Available) Cisco UCS S3260 M4 Storage Voice and Unified Communications Devices Cisco Remote Expert Mobile CSCvm02994 Video, Streaming, TelePresence, and Transcoding Devices Cisco Video Surveillance Media CSCvm04841 Server Cisco Cloud Hosted Services Cisco Metacloud CSCvm02969 ^1Cisco UCS M4 and M5 Rack Servers are used as part of the Cisco HyperFlex Solution. Products Confirmed Not Vulnerable The following Cisco products are considered not vulnerable to foreshadow or other identified L1 Terminal Fault-related vulnerabilities. Specific models in these product families may be affected and will be explicitly listed in the preceding Vulnerable Products section. Routers Branch Routers - Cisco 4000 Series Integrated Services Routers - Cisco 1900 Series Integrated Services Routers - Cisco 1800 Series Integrated Services Routers - Cisco 1000 Series Integrated Services Routers - Cisco 2900 Series Integrated Services Routers - Cisco 3900 Series Integrated Services Routers - Cisco 800 Series Routers Data Center Interconnect Platforms - Cisco ASR 1000 Series Aggregation Services Routers - Cisco Carrier Routing System - Cisco Catalyst 6500 Series Switches Industrial Routers - Cisco 2000 Series Connected Grid Routers - Cisco 1000 Series Connected Grid Routers - Cisco 900 Series Industrial Routers - Cisco 800 Series Industrial Integrated Services Routers - Cisco 500 Series WPAN Industrial Routers - Cisco Wireless Gateway for LoRaWAN Cloud Networking Services - Cisco Cloud Services Router 1000V Series Mobile Internet Routers - Cisco 5900 Series Embedded Services Routers - Cisco MWR 2900 Series Mobile Wireless Routers Service Provider Core Routers - Cisco Carrier Routing System - Cisco Network Convergence System 6000 Series Routers Service Provider Edge Routers - Cisco 12000 Series Routers - Cisco ASR 1000 Series Aggregation Services Routers - Cisco ASR 920 Series Aggregation Services Router - Cisco ASR 901 Series Aggregation Services Routers - Cisco ASR 900 Series Aggregation Services Routers - Cisco XR 12000 Series Router - Cisco Network Convergence System 500 Series Routers Small Business Routers - Cisco 1900 Series Integrated Services Routers - Cisco 800 Series Routers - Cisco Small Business RV Series Routers Virtual Routers - Cisco Cloud Services Router 1000V Series - Cisco WAN Aggregation and Internet Edge Routers - Cisco ASR 1000 Series Aggregation Services Routers - Cisco Catalyst 6500 Series Switches Switches Blade Switches - Cisco Blade Switches for Dell - Cisco Blade Switches for FSC - Cisco Blade Switches for HP - Cisco Nexus 4000 Series Switches - Cisco Switch Modules for IBM - Cisco SFS Solutions for Blade Switches - Cisco SFS Solution for Dell Campus LAN Switches - Access - Cisco Catalyst 4500 Series Switches - Cisco Catalyst 3850 Series Switches - Cisco Catalyst 3750 Series Switches - Cisco Catalyst 2960-L Series Switches - Cisco Catalyst 2960-Plus Series Switches - Cisco Catalyst 2960-X Series Switches - Cisco Edge Series - Cisco Meraki Cloud Managed Switches - Cisco Redundant Power Systems Campus LAN Switches - Core and Distribution - Cisco Catalyst 9500 Series Switches - Cisco Catalyst 6800 Series Switches - Cisco Catalyst 6500 Series Switches - Cisco Catalyst 6500 Virtual Switching System 1440 - Cisco Catalyst 4900 Series Switches - Cisco Catalyst 4500 Series Switches - Cisco Catalyst 4500-X Series Switches - Cisco Catalyst 3850 Series Switches Campus LAN Switches - Digital Building - Cisco Catalyst 3560-CX Series Switches - Cisco Catalyst 2960-C Series Switches - Cisco Catalyst 2960-CX Series Switches - Cisco Catalyst 2960-L Series Switches - Cisco Catalyst Digital Building Series Switches Data Center Switches - Cisco Nexus 2000 Series Fabric Extenders - Cisco R Series Racks - Cisco RP Series Power Distribution Units - Cisco Data Center Network Management - Cisco Data Center Network Manager - Cisco Fabric Manager - Cisco MDS 9000 Series Multilayer Switches - Cisco Data Center Switches with Cisco IOS Software - Cisco Catalyst 6500 Series Switches - Cisco Catalyst 4900 Series Switches - Cisco Energy and Asset Management - Cisco Asset Management Suite - Cisco Energy Management Suite Industrial Ethernet Switches - Cisco 2500 Series Connected Grid Switches - Cisco Embedded Service 2020 Series Switches - Cisco Industrial Ethernet 5000 Series Switches - Cisco Industrial Ethernet 4010 Series Switches - Cisco Industrial Ethernet 4000 Series Switches - Cisco Industrial Ethernet 3010 Series Switches - Cisco Industrial Ethernet 3000 Series Switches - Cisco Industrial Ethernet 2000 Series Switches - Cisco Industrial Ethernet 2000U Series Switches - Cisco Industrial Ethernet 1000 Series Switches InfiniBand Switches - Cisco SFS 7000 Series InfiniBand Server Switches - Cisco SFS 3500 Series Multifabric Server Switches - Cisco SFS 3000 Series Multifabric Server Switches LAN Switches - Small Business - Cisco 550X Series Stackable Managed Switches - Cisco 350 Series Managed Switches - Cisco 350X Series Stackable Managed Switches - Cisco 250 Series Smart Switches - Cisco 220 Series Smart Switches - Cisco ESW2 Series Advanced Switches - Cisco Small Business 300 Series Managed Switches - Cisco Small Business 200 Series Smart Switches - Cisco Small Business 110 Series Unmanaged Switches - Cisco Small Business Smart Switches - Cisco Small Business Stackable Managed Switches - Cisco Small Business Unmanaged Switches Service Provider Switches - Aggregation - Cisco Catalyst 6500 Series Switches - Cisco Catalyst 4500 Series Switches - Cisco ME 4900 Series Ethernet Switches - Cisco ME 3800X Series Carrier Ethernet Switch Routers Service Provider Switches - Ethernet Access - Cisco Catalyst 3750 Metro Series Switches - Cisco ME 3600X Series Ethernet Access Switches - Cisco ME 3400 Series Ethernet Access Switches - Cisco ME 3400E Series Ethernet Access Switches - Cisco ME 1200 Series Carrier Ethernet Access Devices - Cisco Small Business Gigabit SP Switches Virtual Networking - Cisco Application Centric Infrastructure Virtual Edge - Cisco Application Virtual Switch - Cisco Cloud Services Platform 2100 - Cisco Nexus 1000V InterCloud - Cisco Nexus 1000V Switch for KVM - Cisco Nexus 1000V Switch for Microsoft Hyper-V - Cisco Nexus 1000V Switch for VMware vSphere Cloud Networking Services - Cisco Prime Virtual Network Analysis Module (vNAM) - Cisco Virtual Security Gateway WAN Switches - Cisco IGX 8400 Series Switches MGX Switches - Cisco MGX 8900 Series Switches - Cisco MGX 8850 Software - Cisco MGX 8800 Series Switches - Cisco MGX 8250 Software - Cisco MGX 8200 Series Edge Concentrators Wireless Indoor Access Points - Cisco Aironet 1815 Series Access Points - Cisco Aironet 2800 Series Access Points - Cisco Aironet 3800 Series Access Points - Cisco Aironet 4800 Access Point Outdoor and Industrial Access Points - Cisco Aironet 1540 Series Access Points - Cisco Aironet 1560 Series Access Points - Cisco Aironet 1570 Series Access Points Wireless LAN Controllers - Cisco Virtual Wireless Controller - Cisco Meraki Cloud Managed Access Points Security Cisco Cloud-Hosted Products - Cisco AMP family of products and endpoint protection clients - Cisco Cloud Security - Cisco Cloudlock - Cisco Umbrella Email Security - Cisco Content Security Management Appliance - Cisco Email Security - Cisco Email Encryption - Cisco Email Encryption - Cisco Registered Envelope Service Firewalls - Cisco 3000 Series Industrial Security Appliances (ISA) - Cisco Meraki Cloud Managed Security Appliances - Cisco Adaptive Security Appliances (ASA) - Cisco Adaptive Security Virtual Appliance (ASAv) Firewall Management - Cisco Adaptive Security Device Manager - Cisco Firepower Device Manager - Cisco Firepower Management Center - Cisco Security Manager Next-Generation Firewalls (NGFW) - Cisco ASA 5500-X with FirePOWER Services - Cisco Firepower 9000 Series - Cisco Firepower 4100 Series - Cisco Firepower 2100 Series Network Security - Cisco VPN Internal Service Module for ISR G2 Network Visibility and Segmentation - Cisco ISE Passive Identity Connector - Cisco Security Packet Analyzer - Cisco Stealthwatch Cloud - Cisco Stealthwatch Enterprise Next-Generation Intrusion Prevention System (NGIPS) - Cisco FirePOWER 8000 Series Appliances - Cisco FirePOWER 7000 Series Appliances Security Management - Cisco Firepower Management Center - Cisco Adaptive Security Device Manager - Cisco Content Security Management Appliance - Cisco Defense Orchestrator Unified Communications - Cisco Business Edition 6000 - 100x80 - Cisco Business Edition 6000 - Cisco Jabber - 100x80 - Cisco Jabber - Cisco Expressway Customer Care - Cisco Unified Contact Center Express - Cisco Unified Contact Center Enterprise - Cisco Finesse - Cisco MediaSense Conferencing - Cisco Meeting Server - Cisco Webex Meeting Center - Cisco Webex Meetings Server - Cisco TelePresence Management Suite - Cisco TelePresence Server - Cisco TelePresence Conductor Collaboration Endpoints - Cisco 8800 Series IP Phones - Cisco 7800 Series IP Phones - Cisco 6900 Series IP Phones - Cisco 3900 Series SIP Phones - Cisco Desktop Collaboration Experience - DX600 Series - Cisco DX Series - Cisco TelePresence SX10 Quick Set - Cisco TelePresence MX Series - Cisco TelePresence IX5000 Series Cisco Unified Computing Management Platforms - Cisco Intersight - Cisco UCS Manager - Cisco UCS Central - Cisco UCS Performance Manager IP Video - Cisco Access Edge - Cisco Cable Modem Termination Systems (CMTSs) - Cisco RF Switches - Cisco cBR Series Converged Broadband Routers - Cisco uBR10000 Series Universal Broadband Routers - Cisco uBR7225VXR Universal Broadband Routers - Cisco uBR7200 Series Universal Broadband Routers No other Cisco IP video products are known to be affected. Internet of Things (IoT) - Cisco Jasper Control Center - Cisco IoT Management - Cisco Application Enablement - Cisco IoT Security - Cisco Kinetic - Cisco Extended Enterprise Cisco has investigated the following products and they are not considered to be affected by the vulnerabilities that are described in this advisory: Collaboration and Social Media - Cisco Meeting Server Network Application, Service, and Acceleration - Cisco Tetration Analytics Network and Content Security Devices - Cisco Identity Services Engine (ISE) - Cisco Umbrella Virtual Appliance Network Management and Provisioning - Cisco Evolved Programmable Network Manager - Cisco Policy Suite - Cisco Prime Infrastructure Routing and Switching - Enterprise and Service Provider - Cisco 1000 Series Connected Grid Routers - Cisco 800 Series Industrial Integrated Services Routers - Cisco Application Policy Infrastructure Controller (APIC) - Cisco Catalyst 3650 Series Switches - IOx feature - Cisco Nexus 4000 Series Blade Switches - Cisco Nexus 9000 Series Fabric Switches - ACI mode - Cisco Virtual Application Policy Infrastructure Controller (APIC) Unified Computing - Cisco Common Services Platform Collector - Cisco UCS Director Voice and Unified Communications Devices - Cisco Meeting Management - Cisco Unified Communications Manager Session Management Edition - Cisco Unified Communications Manager Video, Streaming, TelePresence, and Transcoding Devices - Cisco TelePresence Conductor - Cisco TelePresence ISDN Gateway 3241 - Cisco TelePresence ISDN Gateway MSE 8321 - Cisco TelePresence MCU 4200 Series, 4500 Series, 5300 Series, MSE 8420, and MSE 8510 - Cisco TelePresence Server 7010 and MSE 8710 - Cisco TelePresence Server on Multiparty Media 310 and 320 - Cisco TelePresence Server on Multiparty Media 820 - Cisco TelePresence Server on Virtual Machine - Cisco TelePresence Supervisor MSE 8050 - Tandberg Codian ISDN Gateway 3210, 3220, and 3240 - Tandberg Codian MSE 8320 Wireless - Cisco Mobility Services Engine - Cisco Wireless Gateway for LoRaWAN - Cisco Wireless LAN Controller Cisco Cloud Hosted Services - Cisco Cloudlock - Cisco Hosted Collaboration Solution (HCS) for Government - Cisco Umbrella - Cisco Webex Teams (formerly Cisco Spark) Workarounds o There are no workarounds that address this vulnerability. Fixed Software o For information about fixed software releases, consult the Cisco bug ID(s) at the top of this advisory. When considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page, to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o CVE ID CVE-2018-3615 was reported to Intel by Raoul Strackx, Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, and Yuval Yarom. CVE ID CVE-2018-3620 and CVE-2018-3646 were discovered by Intel during the research of foreshadow. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Subscribe to Cisco Security Notifications o Subscribe URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/ cisco-sa-20180814-cpusidechannel Revision History o +---------+-----------------------------+----------+---------+----------------+ | Version | Description | Section | Status | Date | +---------+-----------------------------+----------+---------+----------------+ | | Updated the Products Under | | | | | 1.5 | Investigation, Confirmed | Affected | Interim | 2018-August-31 | | | Vulnerable, and Confirmed | Products | | | | | Not Vulnerable sections. | | | | +---------+-----------------------------+----------+---------+----------------+ | | Updated the Products Under | | | | | 1.4 | Investigation, Confirmed | Affected | Interim | 2018-August-28 | | | Vulnerable, and Confirmed | Products | | | | | Not Vulnerable sections. | | | | +---------+-----------------------------+----------+---------+----------------+ | | Updated the Products Under | | | | | 1.3 | Investigation, Confirmed | Affected | Interim | 2018-August-22 | | | Vulnerable, and Confirmed | Products | | | | | Not Vulnerable sections. | | | | +---------+-----------------------------+----------+---------+----------------+ | | Removed SGX reference to | | | | | | UCS in the Summary section, | | | | | | no shipping UCS products | | | | | | currently support SGX | Summary | | | | 1.2 | technology. Updated | and | Interim | 2018-August-17 | | | Affected Products sections: | Affected | | | | | Products Under | Products | | | | | Investigation, Confirmed | | | | | | Vulnerable, and Confirmed | | | | | | Not Vulnerable. | | | | +---------+-----------------------------+----------+---------+----------------+ | | Updated Affected Products | | | | | | Sections: Under | Affected | | | | 1.1 | Investigation, Confirmed | Products | Interim | 2018-August-15 | | | Vulnerable, and Confirmed | | | | | | Not Vulnerable. | | | | +---------+-----------------------------+----------+---------+----------------+ | 1.0 | Initial public release. | -- | Interim | 2018-August-14 | +---------+-----------------------------+----------+---------+----------------+ Legal Disclaimer o THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME. CISCO EXPECTS TO UPDATE THIS DOCUMENT AS NEW INFORMATION BECOMES AVAILABLE. A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBW4zYS2aOgq3Tt24GAQjJww/+IagRD7PNTvYqPKFS0zvOTAidTyTGsUr7 4uNjGDlCmYEFHxaLWGsD4SEeZ3p5hjfu2tq2MSj0b3lIOazkNpVPcFRM/pdmuSHp r2fJQahc40aFZf4uuOk9Dj6ckcCIoUjP4ZHBXw8AYJBOoGtxVpo3iikd5OSHmHrg uK+PnShhg42fzYz/QkmdHDOwXXTlXuvv8eSZYg68skdM381fjD1QGB9fOq9SFugS L/p4HCKfFRNhdbpqVhdykanapL709BrBJAefWq1jMIdbOOEOUPDu/XKffcQe5/oo lJkux0NwleDlXrJmq+/t3EbU2+rEfNSmEi6bok3/aYOHrzB6hfHuSkHd3Vi5oFPF KIY0xJdi74owZi5Uuun5fUMXMpkc5TpYV00gAc8HqmxNwXtTO8XA9z5sdWAKGLpZ bAqa/VJngL7G6uhNiVRrzROWv2ZdZDKQcLPtAMAHNI9UrXe1GrI5Drbh3wrukmQy 6pvs1c52z4AljckFwuvUXhyWlf08xCg+LRfkQ6WZ9wHU6taaUAoVGoD320KjL8+3 HvAzgbFWeMnrlwDxZNSvs11g/GmtA8VVfXAUNCeIk1MSFIu07ab2Fd+ORLg0RdD/ Qc4aFnvJAN03vO1tu/EMiNrI/VR5R2YOz8aVqvK/vELo5f/59VMlw7YJKERzz6Vp //eVqVbvGLg= =7O/O -----END PGP SIGNATURE-----