5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
0.002 Low
EPSS
Percentile
51.5%
CVE-2018-3639 Speculative Store Bypass Disable is an issue that may affect third-party software that runs in guest VMs on Citrix XenServer. This is not an issue caused by Citrix XenServer and Citrix is unaware of any means of exploiting this issue against XenServer itself.
Third-party software can mitigate this issue by restructuring of the code; for Intel CPUs, third-party software may instead choose to mitigate this issue by selectively enabling and disabling a CPU feature known as memory disambiguation. This requires both new host firmware and the new functionality of that firmware to be exposed to guest VMs. To expose this firmware functionality, Citrix is releasing hotfixes for supported versions of Citrix XenServer 7.x.
Customers wishing to expose the new host firmware functionality to their guest VMs should install both the Citrix XenServer hotfixes and updated host firmware or BIOS code. The locations of the Citrix XenServer hotfixes are listed below; Citrix recommends following your hardware supplier’s guidance for firmware updates.
Citrix XenServer 7.4: CTX235133 – <https://support.citrix.com/article/CTX235133>
Citrix XenServer 7.3: CTX235132 – <https://support.citrix.com/article/CTX235132>
Citrix XenServer 7.1 LTSR CU1: CTX235131 – <https://support.citrix.com/article/CTX235131>
Citrix XenServer 7.0: CTX235130 – <https://support.citrix.com/article/CTX235130>
Note that, in line with previous issues that were not vulnerabilities in Citrix XenServer, mitigations are not available for versions 6.x of Citrix XenServer.
Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at _ <http://support.citrix.com/>_.
If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at _ <https://www.citrix.com/support/open-a-support-case.html>_.
Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 – Reporting Security Issues to Citrix
Date | Change |
---|---|
22nd May 2018 | Initial Publication |
CPE | Name | Operator | Version |
---|---|---|---|
citrix xenserver | le | 7.4 | |
citrix xenserver | le | 7.3 | |
citrix xenserver | le | 7.1 | |
citrix xenserver | le | 7.0 |
5.5 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
2.1 Low
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
0.002 Low
EPSS
Percentile
51.5%