قالب وردپرس درنا توس
Home / Mac / MacStadium customers are protected against Foreshadow

MacStadium customers are protected against Foreshadow



Foreshadow, another speculative design utilizes vulnerability in the spectrum of Specter and Meltdown, causes IT and DevOps professional headaches this week, as they use a drop surface intended to reduce potential effects. Although Intel is difficult to use (narrative, Intel has not yet revealed any real victims), what type of data (including passwords) that can be filtered out and the inefficiency of previous solutions to it makes this vulnerability worth taking into account. [19659002] The specific issue for CI / CD projects is potential impact on virtual machines, since Teeshadow could help break down the walls between them. In connection with World Championships, the dividend may allow a malicious World Cup to derive the contents of the hypervisor or another World Cup's privileged information if both World Championships live in the same core as the L1

data buffer. In other words, malicious software on a guest World Cup (of a affected system) may potentially lift sensitive data from another other virtual machine.

What does this mean for MacStadium customers? Fortunately, not much, because MacStadium customers were never at risk for this exploitation. First, the default firewall implementation blocks all possible methods of attack. Attackers must have local user access with guest OS privileges to exploit the vulnerability, as our default firewall configuration blocks. Our physical security measures prevent physical access to the machines. And most importantly, MacStadium's host infrastructure is built on Apple hardware that does not contain the affected Intel chips.

Although MacStadium customers remain unaffected by Foreshadow, customers should always be sure to get an efficient and timely update program. To upgrade your VMware implementation, just open a ticket to contact Support with your request. And while Apple Insider expects Apple patches in the future of this vulnerability, we expect them to scratch MacBooks and other systems that actually contain an affected Intel chip. As always, we will be vigilant about the potential consequences of any security issues that may affect MacStadium customers and stay up to date.


Source link