Intel disclosed a new class of CPU speculative-execution vulnerabilities, known collectively as “L1 Terminal Fault.” This new class of vulnerabilities can occur on current and past Intel processors (from at least 2009 – 2018) when affected Intel microprocessors are speculating beyond an unpermitted data access.
By continuing the speculation in these cases, the affected Intel microprocessors expose a new side-channel for attack, allowing a malicious VM to infer data in the hypervisor and other VMs running on a core.
Our top priority is protecting and ensuring the security of your data and systems. As is our practice, VMware has been working closely with industry partners, such as Intel and others, to assess the issue and determine the most effective update and/or patch in conjunction with our partners. To learn more, please read this Knowledge Base (KB) article, which has been created as the centralized source of information for this issue. The article provides links to additional KB articles with detailed mitigation processes for each of the attack vectors identified by the L1 Terminal Fault vulnerabilities.
VMware Cloud on AWS brings VMware’s software-defined data center (SDDC) to the AWS Cloud, allowing customers to get the ability to seamlessly integrate their on-premises data center environments with AWS using their existing tools and skillsets within a common operating environment based on familiar VMware software. Accenture is an early access partner for the joint VMware Cloud on AWS offering.
Watch this video to hear from Jack Sepple, Senior Managing Director, Cloud & Operations, Accenture and Larry Socher, Global Managing Director, Infrastructure Services and Strategy, Accenture and learn how VMware Cloud on AWS plays a critical role in enabling customers’ hybrid cloud adoption.
As a reminder, the cut-off time for the end of our third 4-4-5 fiscal quarter (Q3′ FY18) is November 3, 2017, at 6 PM Cork, Ireland local time (for international orders) and 6 PM Pacific time (for orders in the Americas). Read more.