Author: Josh Simon

Protecting against Intel’s new L1TF speculation vulnerabilities

Intel recently announced a new security vulnerability called L1 Terminal Fault (L1TF) that affects all modern Intel processors and the virtual machines running on them.

In short, the L1TF vulnerability in Intel processors can allow a savvy attacker to expose the level-1 cached data from another virtual machine running on the same host processor core as the attacker’s virtual machine.

Since Intel’s announcement of L1TF we have been testing and working on deploying mitigations to secure our platforms against L1TF. We anticipate completion of these efforts across our global footprint within a few weeks. If any of these efforts require service affecting changes, we will notify you directly in advance of those changes being implemented.

What steps should you take to protect your environment against L1TF?

You should ensure your operating system within your virtual machines is up-to-date with all available patches applied.

In closing, new vulnerabilities will always be discovered by researchers and vendors and Atlantic.Net will always work diligently to protect our customers and offload much of the burden of addressing these vulnerabilities.

We will update this post as more information becomes available.

About Atlantic.Net

Atlantic.Net is a leader in cloud hosting solutions, including HIPAA-compliant cloud hosting.


New York, NY

100 Delawanna Ave, Suite 1

Clifton, NJ 07014

United States

San Francisco, CA

2820 Northwestern Pkwy,

Santa Clara, CA 95051

United States

Dallas, TX

2323 Bryan Street,

Dallas, Texas 75201

United States

Ashburn, VA

1807 Michael Faraday Ct,

Reston, VA 20190

United States

Orlando, FL

440 W Kennedy Blvd, Suite 3

Orlando, FL 32810

United States

Toronto, Canada

20 Pullman Ct, Scarborough,

Ontario M1X 1E4

Canada

London, UK

14 Liverpool Road, Slough,

Berkshire SL1 4QZ

United Kingdom

Resources

We use cookies for advertising, social media and analytics purposes. Read about how we use cookies in our updated Privacy Policy. If you continue to use this site, you consent to our use of cookies and our Privacy Policy.