cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
650
Views
0
Helpful
4
Replies

CSCvh32394 - Evaluation of nexus-5000-all for CPU Side-Channel Information Disclosure - 2

basantpandey
Level 1
Level 1

Could you please let me know if this image is affected  . we are useing Cisco Nexus 5000 with Cisco IOS - 5.2(1)N1(4) .

4 Replies 4

Leo Laohoo
Hall of Fame
Hall of Fame
All versions are affected. No fix yet.

basantpandey
Level 1
Level 1

Thanks for your Reply . if the all version are affected then why only 2 Affected version are showing on cisco bug search tool. 

 

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh32394

Kindly read this:  Root Cause of Reboot Issue Identified; Updated Guidance for Customers and Partners

Take note of this:  

We recommend that OEMs, cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions, as they may introduce higher than expected reboots and other unpredictable system behavior.

There is no fix yet because even Intel's "fix" has been borking the CPU.  

The first two vulnerabilities, CVE-2017-5753 and CVE-2017-5715, are collectively known as Spectre. The third vulnerability, CVE-2017-5754, is known as Meltdown. The vulnerabilities are all variants of the same attack and differ in the way that speculative execution is exploited.

To exploit any of these vulnerabilities, an attacker must be able to run crafted code on an affected device. Although the underlying CPU and operating system combination in a product or service may be affected by these vulnerabilities, the majority of Cisco products are closed systems that do not allow customers to run custom code and are, therefore, not vulnerable. There is no vector to exploit them. Cisco products are considered potentially vulnerable only if they allow customers to execute custom code side-by-side with Cisco code on the same microprocessor.

A Cisco product that may be deployed as a virtual machine or a container, even while not directly affected by any of these vulnerabilities, could be targeted by such attacks if the hosting environment is vulnerable. Cisco recommends that customers harden their virtual environments, tightly control user access, and ensure that all security updates are installed. Customers who are deploying products as a virtual device in multi-tenant hosting environments should ensure that the underlying hardware, as well as operating system or hypervisor, is patched against the vulnerabilities in question.

Although Cisco cloud services are not directly affected by these vulnerabilities, the infrastructure on which they run may be impacted. Refer to the “Affected Products” section of this advisory for information about the impact of these vulnerabilities on Cisco cloud services.

Cisco will release software updates that address these vulnerabilities.
 
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel