Ladies and Gentlemen!
Cisco has published a recent Security Advice.
A vulnerability in Intel CPU processors could allow a local attacker to access sensitive information on a targeted system.
In order to exploit any of these vulnerabilities, an attacker must have access to the affected device and must be able to run crafted code on it.
The majority of Cisco products are closed systems, which do not allow customers to run custom code on the device.
Only Cisco devices that are found to allow the customer to execute their customized code side-by-side with the Cisco code on the same microprocessor are considered vulnerable.
Please note a Cisco product that may be deployed as a virtual machine or a container could be targeted by such attacks if the hosting environment is vulnerable.
For details and updates please visit the corresponding Cisco Security Advisory:
For detailed information please contact us via email@example.com