Create Case
VN 2018-002 (CVE-2017-5754 - Meltdown)
- Article Type:
- Security Advisory
- Article Number:
- 000060029
- Last Modified:
- 4/19/2018
Summary
"Meltdown" is an attack that exploits a flaw in the speculative execution implementation of many widely used processors to allow an unprivileged user program to examine arbitrary physical memory addresses. In its most widely publicized form, Meltdown is demonstrated to read arbitrary kernel space memory from a user process through local execution of a crafted user space program that targets kernel memory addresses known to contain desired data. Extreme products utilize a number of different processor architectures, some of which contain the Meltdown vulnerability. Currently demonstrated Meltdown exploits require execution of crafted code installed on the target device. Extreme products that do not provide a mechanism to execute third-party code are not exposed to Meltdown exploits provided other unauthorized means are not employed to gain privileged access to the system to install code. While it is theoretically possible to conduct an attack strictly via network access, the challenges that must be overcome to identify the required code patterns and induce the required behavior to conduct an impactful exploit in a production environment are sufficiently high that the network-based exploit is not considered practicable at this time. Extreme products deployed in virtual environments may be exposed to Meltdown if the hosting environment is vulnerable. Extreme continues to monitor and evaluate upstream vendor processor microcode and software updates. Patches or other mitigations may be deployed in future software updates. |
Products Potentially Affected
Extreme products not explicitly identified above are under investigation. (1) Extreme is evaluating the stability and performance impacts of possible patches to the processor microcode and OS kernel. A final remediation plan is pending completion of testing. Due to the nature and scope of changes required to implement available patches, there are currently no plans to backport Spectre/Meltdown remediations to currently shipping releases. Customers are advised to implement the suggested mitigations to control import and execution of user scripts. (2)Extreme is evaluating the stability and performance impacts of possible patches to the processor microcode. Extreme is also exploring methods for disabling user script execution. A final remediation plan is pending completion of testing. |
Impact Details
Currently demonstrated Meltdown exploits require execution of crafted code installed on the target device. While the circumstances for using the capability are rare, ExtremeSwitching and Data Center platforms support the import and execution of user scripts via local access only. Exposure to impactful Meltdown exploits may be reduced to a negligible level by strictly controlling imported scripts or altogether disabling the ability to execute imported scripts. Mitigations customers may implement immediately focus on control of imported scripts:
|
Repair Recommendations
Customers of Extreme products that provide a mechanism to execute third-party code are urged to exercise care in evaluating and authenticating any applications deployed on the Extreme platform. Customers that deploy Extreme products in virtual environments are reminded to harden their virtual environment and install all security updates. Customers are reminded to observe all security best practices in configuration of their systems to reduce exposure to unauthorized access. |
Legal Notice
This advisory notice is provided on an “as is” basis and Extreme Networks makes no representations or warranties of any kind, expressly disclaiming the warranties of merchantability or fitness for a particular use. Use of the information provided herein or materials linked from this advisory notice is at your own risk. Extreme Networks reserves the right to change or update this document at any time, and expects to update this document as new information becomes available. The information provided herein is applicable to current Extreme Networks products identified herein and is not intended to be any representation of future functionality or compatibility with any third-party technologies referenced herein. This notice shall not change any contract or agreement that you have entered into with Extreme Networks. |
Version
13