-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT External Security Bulletin Redistribution
Meltdown and Spectre class vulnerabilities
27 August 2019
AusCERT Security Bulletin Summary
Operating System: Network Appliance
Impact/Access: Access Privileged Data -- Existing Account
Increased Privileges -- Unknown/Unspecified
CVE Names: CVE-2019-11091 CVE-2018-12130 CVE-2018-12127
CVE-2018-12126 CVE-2018-3693 CVE-2018-3665
CVE-2018-3646 CVE-2018-3640 CVE-2018-3639
CVE-2018-3620 CVE-2018-3615 CVE-2017-5754
Revision History: August 27 2019: Vendor added information about
May 27 2019: Initial Release
- --------------------------BEGIN INCLUDED TEXT--------------------
Meltdown and Spectre class vulnerabilities
IR Number : FG-IR-18-002
Date : Jan 04, 2018
Risk : 2/5
Impact : Information Disclosure, Privilege Escalation
CVE ID : CVE-2017-5753, CVE-2017-5715, CVE-2017-5754, CVE-2018-3615,
CVE-2018-3620, CVE-2018-3639, CVE-2018-3640, CVE-2018-3646, CVE-2018-3665,
CVE-2018-3693, CVE-2019-11091, CVE-2018-12130, CVE-2018-12127, CVE-2018-12126,
New types of side channel attacks impact most processors including Intel, AMD,
ARM, etc. These attacks allow malicious userspace processes to read kernel
memory, thus potentially causing kernel sensitive information to leak.
These attacks are referred to as Meltdown and Spectre class vulnerabilities,
and variants of them:
o CVE-2017-5753 Variant 1, Bounds Check Bypass (Spectre BCB)
o CVE-2017-5715 Variant 2, Branch Target Injection (Spectre BTI)
o CVE-2017-5754 Variant 3, Rogue Data Cache Load (Meltdown RDCL)
o CVE-2018-3640 Variant 3a, Rogue System Register Read (Spectre-NG RSRE)
o CVE-2018-3639 Variant 4: Speculative Store Bypass (Spectre-NG SSB)
o CVE-2018-3665 Lazy FP state restore (Spectre-NG LazyFP)
o CVE-2018-3693 Spectre 1.1: Bounds Check Bypass Store (Spectre-NG BCBS)
o CVE unknown: Spectre 1.2: Read-only Protection Bypass (RPB)
o CVE unknown: Other Spectre-NG flaws (Spectre-NG)
o CVE unknown: Attack against Return Stack Buffer (SpectreRSB)
o CVE-2017-5753 Remote PoC attack on Spectre Variant 1 (NetSpecture)
o CVE unknown: Attack against Branch Prediction Units (BranchScope)
o CVE-2018-3615 L1 Terminal Fault: SGX (Foreshadow)
o CVE-2018-3620 L1 Terminal Fault: OS/SMM (Foreshadow-NG)
o CVE-2018-3646 L1 Terminal Fault: VMM (Foreshadow-NG)
o CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
o CVE-2018-12130: Microarchitectural Fill Buffer Data Sampling (MFBDS)
o CVE-2018-12127: Microarchitectural Load Port Data Sampling (MLPDS)
o CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
o CVE-2019-1125 SWAPGS Spectre Side-Channel Vulnerability (SWAPGS)
Information Disclosure, Privilege Escalation
The following products run processors that may be affected by Meltdown/Spectre
and variants; they are not, however, directly exploitable:
Indeed Fortinet products are designed to not permit arbitrary code execution in
the user space under regular conditions. Thus Meltdown/Spectre attacks and
their variants are only possible if the attack is combined with an additional
local or remote code execution vulnerability, unrelated to these two issues -
Meltdown and Spectre can then aggravate the situation, if such vulnerabilities
exist and are successfully exploited.
To lower your attack risk to Meltdown/Spectre and reduce the possibility of an
"already existing local or remote code execution vulnerability", upgrading to
our latest publicly available software version is highly recommended.
Due to the fact the OS kernel patch, by nature, slows the performance down, and
considering the low risk, OS kernel patches may be produced and update details,
if have any, will be given in product release notes.
Please note that in any case, any vulnerability (Local code execution or remote
code execution) that would enable the exploitability of Spectre/Meltdown class
vulnerabilities will always be treated as a high/critical severity
vulnerability, and swiftly fixed.
Customers are suggested to upgrade to the following listed branches and
versions (newer branches preferred):
FortiOS upgrade to 5.6.3, 6.0.0 or newer versions
FortiAP upgrade to 5.6.5, 6.0.2 or newer versions
FortiSwitch upgrade to 3.6.3, 4.0.0 or newer versions
FortiAnalyzer upgrade to 5.6.6, 6.0.2 or newer versions
01-04-2018 Initial version.
01-18-2018 Final assessment.
05-22-2018 Remove other vendors (Microsoft Windows/VMware) patch info.
05-22-2018 Include variant v3a, v4 and Spectre-ng vulnerabilities.
07-12-2018 Include LazyFP, variant v1.1 and v1.2
08-01-2018 IncludeSpectreRSB andNetSpecture
08-16-2018 Include BranchScope, Foreshadow and Foreshadow-NG
11-22-2018 Add product mitigation suggestions.
05-24-2019 Included Intel ZombieLoad Side-Channel Attacks
08-26-2019 Included SWAPGS Spectre Side-Channel Vulnerability
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to firstname.lastname@example.org
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
Australian Computer Emergency Response Team
The University of Queensland
Internet Email: email@example.com
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----