A hardware security flaw has been reported this week that affects processors manufactured by Intel, AMD, ARM and POWER. This vulnerability, if exploited, would be executed through malware infections, and could gather sensitive data such as passwords and encryption keys from computing devices.
SymQuest is closely monitoring vendor patch releases and will be coordinating updates as they are available. We have included our risk mitigation options below:
While this security flaw is concerning, the immediate risk of a cyber attack is very low. Additionally, processor manufacturers state that this particular exploit is a read-only exploit and cannot corrupt, modify, or delete data. All manufacturers are working with their vendors to quickly publish patches to address this issue.
Microsoft is issuing an out-of-band security update to supported versions of Windows, these versions include Windows 10 and Server 2016. Older software updates will be automatically starting next Tuesday, during Microsoft Patch Tuesday. The Microsoft patch will address processors by Intel. AMD, and ARM manufacturers.Deployment Mechanism
- Windows 10 systems and Server 2016 will be automatically updated today (January 5, 2017), once released by Microsoft.
- Windows 7 or 8 will be updated during your next regular patching window, starting as early as next Tuesday
VMware has already released patched for the CVE-2017-5753 and CVE-2017-5715 vulnerabilities for ESXi versions 5.5, 6.0, and 6.5(along with VMware Workstation and Fusion). Information on where to find the patched is located at https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html. So far, existing environments in which SymQuest performs quarterly patching to ESXi hypervisors have not experienced any noticeable performance degradation as a result of the patches, however; we recommend that you exercise caution when rolling out these updates to ensure user experience is unaffected by these measures.
There is speculation and disagreement on the actual performance impact of initial patches (between 10% and 30% decrease in performance) but the individual impact is also determined by the specific activities, workloads, and processes that are being handled by the processers.
Patches for other operating systems and environments are being released to remedy the issue but it should be expected that there will be more refined updates coming out in the next few weeks to attempt to decrease performance impact, and address the vulnerabilities.
If you have immediate questions about this exploit please call 1-800-374-9900 or email CustomerService@SymQuest.com and we will be happy to assist you.