Saturday, 6 January 2018

× 2018-01 Out of Cycle Security Bulletin: Meltdown & Spectre: CPU Speculative Execution and Indirect Branch Prediction Side Channel Analysis Method

Product Affected:
See Problem and Solution sections below.
Problem:
Modern microprocessors that implement speculative execution of instructions are susceptible to a new class of cache timing attacks being called "Meltdown" and "Spectre".  These vulnerabilities could allow an attacker to read privileged memory which may contain sensitive information such as passwords or encryption keys.

There are three known variants of the issue:
  • Variant 1: bounds check bypass (CVE-2017-5753)
  • Variant 2: branch target injection (CVE-2017-5715)
  • Variant 3: rogue data cache load (CVE-2017-5754)

Almost all modern CPUs, including the ones in most Juniper products, use speculative execution and are potentially susceptible to these types of attacks. However, it is important to note that in order to exploit this weakness and gain access to restricted memory, the attack requires executing crafted code on the device. Many networking devices from Juniper can only execute code signed by Juniper.  In these devices there is no exposure to privileged memory being read by an unauthorized user.

Deployments where users can execute arbitrary code, including many virtualized, container, Flex, and application products are potentially impacted.  Customers should follow standard BCPs to limit exposure and apply fixes as they become available.
 
Solution:

Product Status:

Juniper SIRT is actively investigating the impact on Juniper Networks products and services.

The following products may be impacted if deployed in a way that allows unsigned code execution:
  • Junos OS based platforms
  • Junos Space appliance
  • Qfabric Director
  • CTP Series
  • NSMXpress/NSM3000/NSM4000 appliances 
  • STRM/Juniper Secure Analytics (JSA) appliances
  • SRC/C Series

The following products are not impacted:
  • ScreenOS / Netscreen platforms
  • JUNOSe / E Series platforms
  • BTI platforms

Juniper is continuing to investigate our product portfolio for affected products that are not mentioned above. As new information becomes available this document will be updated.

Where possible, Juniper will be developing software fixes that prevent these type of attacks.  This JSA will be updated as those fixes become available for Juniper devices.
 
Workaround:
In order to mitigate this vulnerability, only run software from trusted sources.  It is also recommended to limit the access to critical infrastructure networking equipment to only trusted administrators from trusted administrative networks or hosts.
 
Modification History:
2018-01-05: Initial publication

Related Links:
CVSS Score:
4.1 (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N)
Risk Level:
Low
Risk Assessment:
In the case of Junos OS, in order to exploit this vulnerability an attacker must have a local authenticated privileged (admin) and needs to bypass the image validation checking.

No comments:

Post a Comment

loading...