<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is Check Point affected by Intel Hyper-Threading flaw (CVE-2018-5407) ? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-Check-Point-affected-by-Intel-Hyper-Threading-flaw-CVE-2018/m-p/13642#M950</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk140072" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk140072"&gt;Check Point Response to CVE-2018-5407 (PortSmash)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Check Point is affected but sees low relevance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 12 Nov 2018 09:19:16 GMT</pubDate>
    <dc:creator>Danny</dc:creator>
    <dc:date>2018-11-12T09:19:16Z</dc:date>
    <item>
      <title>Is Check Point affected by Intel Hyper-Threading flaw (CVE-2018-5407) ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-Check-Point-affected-by-Intel-Hyper-Threading-flaw-CVE-2018/m-p/13639#M947</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="link-titled" href="https://access.redhat.com/security/cve/cve-2018-5407" title="https://access.redhat.com/security/cve/cve-2018-5407"&gt;&lt;STRONG&gt;CVE-2018-5407&lt;/STRONG&gt; - &lt;/A&gt;Intel processor execution engine sharing on SMT (e.g. Hyper-Threading) flaw&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Is Check Point affected?&lt;/STRONG&gt; Should we better disable Hyper-Threading (SMT) until a fix is available?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn't find any notification yet on &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsecurityalerts="&gt;Check Point's Alert page&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2018 08:48:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-Check-Point-affected-by-Intel-Hyper-Threading-flaw-CVE-2018/m-p/13639#M947</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2018-11-06T08:48:26Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point affected by Intel Hyper-Threading flaw (CVE-2018-5407) ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-Check-Point-affected-by-Intel-Hyper-Threading-flaw-CVE-2018/m-p/13640#M948</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Haha, good luck with that on productions chassis running VSX... fully tweaked to coreXL and SXL &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2018 13:14:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-Check-Point-affected-by-Intel-Hyper-Threading-flaw-CVE-2018/m-p/13640#M948</guid>
      <dc:creator>Kaspars_Zibarts</dc:creator>
      <dc:date>2018-11-06T13:14:47Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point affected by Intel Hyper-Threading flaw (CVE-2018-5407) ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-Check-Point-affected-by-Intel-Hyper-Threading-flaw-CVE-2018/m-p/13641#M949</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/41735"&gt;Danny,&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I understood it, you must execute malicious code on the same core to access the other SMT channel. So you need access to the firewall. I don't think the attack should be exploitable without another vulnerability in this case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But let's wait for Check Point's answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Heiko&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Nov 2018 19:41:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-Check-Point-affected-by-Intel-Hyper-Threading-flaw-CVE-2018/m-p/13641#M949</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2018-11-09T19:41:36Z</dc:date>
    </item>
    <item>
      <title>Re: Is Check Point affected by Intel Hyper-Threading flaw (CVE-2018-5407) ?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-Check-Point-affected-by-Intel-Hyper-Threading-flaw-CVE-2018/m-p/13642#M950</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk140072" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk140072"&gt;Check Point Response to CVE-2018-5407 (PortSmash)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Check Point is affected but sees low relevance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Nov 2018 09:19:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Is-Check-Point-affected-by-Intel-Hyper-Threading-flaw-CVE-2018/m-p/13642#M950</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2018-11-12T09:19:16Z</dc:date>
    </item>
  </channel>
</rss>

