Veritas Appliance Statement on Meltdown (CVE-2017-5754), Spectre (CVE-2017-5753 & CVE-2017-5715), and Spectre-NG (CVE-2018-3640 & CVE-2018-3639 & CVE-2018-3665 & CVE-2018-3693), and L1TF (CVE-2018-3615 & CVE-2018-3620 & CVE-2018-3646)
Public security research has disclosed side-channel analysis vulnerabilities identified as "Meltdown" (CVE-2017-5754), "Spectre" (CVE-2017-5753 & CVE-2017-5715), and "Spectre-NG" (CVE-2018-3640 & CVE-2018-3639 & CVE-2018-3665 & CVE-2018-3693), and "L1TF" (CVE-2018-3615 & CVE-2018-3620 & CVE-2018-3646). These vulnerabilities impact products that use x86 architecture, including Intel and other manufacturers' microprocessors.
What we know
- These vulnerabilities do not directly target Veritas software products
- Veritas Appliances are affected because the hardware platform uses Intel components. The impact requires a local user to install and run a binary to gain access to another processes memory.
- The issue is specifically isolated between the hardware architecture and operating system, which affects nearly every hardware vendor using modern processor technologies
- Guidance from our vendors indicate that the mitigation of these vulnerabilities will require updates from both Intel and RedHat
Veritas is committed to the security and safety of its products, our customers, and most importantly, the data we protect. We have evaluated and determined our course of action at this time will be as follows:
- All current supported NetBackup Appliance platforms including the 5340, 5240, 5330, 5230, 5220, and Virtual Appliances addressed Variant 1 (Spectre, CVE-2017-5753) and Variant 3 (Meltdown, CVE-2017-5754) in the software release v3.1.1.
- Veritas has decided to discontinue plans to produce a 126.96.36.199 release due to the low CVSS score, low exploitability, and other factors. Veritas strongly advises customers to upgrade to v3.1.1 if they require remediation.
- It should be noted that the vulnerabilities are considered local only. A user must have local access on the appliance itself to execute these exploits. As always, it is good practice to ensure basic security measures are taken to minimize impact and mitigate risks. Veritas strongly recommends restricting access to critical backup infrastructure, including appliance using industry best practices for access control.
- Variant 2 (CVE-2017-5715) can be addressed by Veritas with an EEB for appliances that use software versions 3.1.1, 3.1.2 and 3.2. See the following link for details and to obtain the EEBs:
- Variant 3a (CVE-2018-3640) can be addressed with a BIOS update from Intel. For details, see the "BIOS Update" section below.
- Variant 4 (CVE-2018-3639) can be addressed with a BIOS update from Intel and with a Veritas update to kernel version 3.10.0-862.3.2. For details, see the "BIOS Update" section below. The kernel update is included in software release 3.2.
Spectre-NG (CVE-2018-3665) can be addressed with a Veritas update to kernel version 3.10.0-862.3.3. This update is included in software release 3.2.
Variant 1.1 (CVE-2018-3693) can be addressed with a Veritas update to kernel version 3.10.0-862.11.6. This update is included in software release 3.2.
L1 Terminal Fault (CVE-2018-3615) can be addressed with a BIOS update from Intel. For details, see the "BIOS Update" section below.
L1 Terminal Fault (CVE-2018-3620) and (CVE-2018-3646) can be addressed with a BIOS update from Intel and with a Veritas update to kernel version 3.10.0-862.11.6 and microcode update to 2.1-29.10. For the BIOS update, see the "BIOS Update" section below. The kernel and microcode updates are included in software release 3.2.
Veritas provides a firmware update tool that lets you update the BIOS to address the Spectre V3a, Spectre V4, and L1TF issues. For details and to obtain the tool, see the following article: https://www.veritas.com/support/en_US/article.100046032
Veritas Appliance Platforms that will not receive a patch or update:
- Veritas 5020 and 5030 Target Deduplication Appliance platforms
- These platforms run versions of SuSE SLES Linux that are beyond End of Support
- Velocity 7330 Appliances
- This platform runs a version of RHEL that RedHat is not providing an update to us
- Backup Exec 3600 Series Appliances
- These appliances may be able to receive a patch from Microsoft as they run Microsoft Storage Server 2008R2 as their base platform operating system
Veritas will not be providing patches for Appliance software OR hardware platforms that have reached their End of Support Life. For more information on Appliance EOSL dates, please visit
Performance Impact Update
After thorough testing and evaluation, Veritas has determined no performance impact or degradation to all appliance platforms in conjunction with Variants 1 & 3, Spectre-NG and L1TF. Further details about Variant 2 will be available when the EEB is released.
For more information on the vulnerabilities, and a statement from Intel, please review the following links:
Veritas will communicate any new and updated information as soon as we discover and verify the information. Questions and comments are welcomed, and should be directed to Veritas Support.
Continue to monitor this Alert for updates. Veritas will provide additional communication updates via this Alert on patch strategy, availability, and timing of release to address these vulnerabilities.
Related Knowledge Base Articles
Was this content helpful?
Rating submitted. Please provide additional feedback (optional):