Spectre and Meltdown vulnerabilities are still very real and gaining more attention in the press. All of our devices have the potential to be vulnerable. This is why it’s always a good idea to ensure we keep our servers and devices up to date. It is important to be installing patches that have been issued for operating systems to mitigate any potential impact.
How Meraki Can Protect you from Spectre and Meltdown
Specific hardware and devices, by design, are likely working to keep you protected. Our clients utilizing Meraki hardware can rest easy knowing that all Cisco Meraki products are closed systems. This means customers are unable to run custom code on the device, providing no means of attack. In order for an attacker to exploit the vulnerabilities of Spectre and Meltdown, they must be able to run crafted code on an affected piece of hardware. The branch of code arranges to execute an attack code based on speculation. Then it loads secure data that the program normally would not have access to. These vulnerabilities could allow an attacker to gain access to privileged memory in the operating system.
Meraki cloud software is also a closed system with no attack vector – custom code cannot be run on the infrastructure. It’s hosted in a private cloud and does not use a shared infrastructure. This ensures that it is not vulnerable to these attacks.
When it comes to detecting and blocking Spectre and Meltdown exploit attempts, the cloud-managed Meraki MX is a Unified Threat Management solution. Its advanced security features, such as Snort signatures, are designed to detect and drop network flows containing Spectre and Meltdown exploit attempts.
We recommend that you take extra security measures by controlling user access, installing security updates and making the recommended patches to protect against vulnerabilities.
If you want to learn more about Meraki hardware and software, contact us today!Contact Us