5.6 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
4.7 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:C/I:N/A:N
0.001 Low
EPSS
Percentile
30.9%
An issue has been identified in certain CPUs that may allow code running in a guest VM to read data from another process in the same VM or another VM running on the same host. The data that can be read is limited to specific CPU registers rather than memory or disk storage; however, those registers may contain sensitive information.
This issue affects all currently supported versions of Citrix XenServer up to and including Citrix XenServer 7.5.
The following issue has been addressed:
Customers with AMD-based CPUs are believed to be unaffected by this issue.
Hotfixes have been released to mitigate these issues. Citrix recommends that affected customers install these hotfixes. The hotfixes can be downloaded from the following locations:
Citrix XenServer 7.5: CTX235135 â <https://support.citrix.com/article/CTX235135>
Citrix XenServer 7.4: CTX235175 â <https://support.citrix.com/article/CTX235175>
Citrix XenServer 7.3: CTX235956 â <https://support.citrix.com/article/CTX235956>
Citrix XenServer 7.1 LTSR CU1: CTX235957 â <https://support.citrix.com/article/CTX235957>
Citrix XenServer 7.0: CTX235958 â <https://support.citrix.com/article/CTX235958>
Citrix recommends that customers follow the guidance of their operating system vendors for updates to the operating systems of their guest VMs.
Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at _ <http://support.citrix.com/>_.
If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at _ <https://www.citrix.com/support/open-a-support-case.html>_.
Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 â Reporting Security Issues to Citrix
Date | Change |
---|---|
15th June 2018 | Initial Issue |
CPE | Name | Operator | Version |
---|---|---|---|
citrix xenserver | le | 7.5 | |
citrix xenserver | le | 7.4 | |
citrix xenserver | le | 7.3 | |
citrix xenserver | le | 7.1 | |
citrix xenserver | le | 7.0 |
5.6 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
4.7 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:C/I:N/A:N
0.001 Low
EPSS
Percentile
30.9%