<img alt="" src="https://secure.smart-cloud-intelligence.com/269727.png" style="display:none;">

Security Advisory - Microarchitectural Data Sampling (MDS) Vulnerabilities

By Timothy Game

Product Director 

Security Advisory - Microarchitectural Data Sampling (MDS) Vulnerabilities

Speakerbus has flagged flaws in the Intel microprocessors, which could allow sensitive information to be accessed. Learn more about these microarchitectural data sampling vulnerabilities.

Microarchitectural Data Sampling (MDS) Vulnerabilities Overview

A number of flaws in Intel microprocessors have been identified which could allow sensitive information to be accessed.

Risk level

The risk of exploitation in a Speakerbus solution is assessed as low.

As this is a hardware flaw in Intel microprocessors, Speakerbus confirmed that all Server products running on Speakerbus servers have some level of exposure to the vulnerabilities.

Those installed on Windows Servers are:

  • iManager Centralised Management System (iCMS),
  • iManager Call Data Server (iCDS),
  • SB 534 GA Server and System Controllers
  • Voice Conference Manager (VCM) products.
  • ARIA iManager Web Server (iWS)

Those installed on CentOS Servers are:

  • iManager Communication Server (iCS)
  • iManager Gateway Server (iGS)
  • ARIA iManager CloudBase (iCB)

Running in a Virtual Machine does not provide protection from the vulnerabilities, so virtual instances of the above, including our Onebox solutions, the S-Series and L-Series, which host some of the above products, are therefore also affected.

The vulnerabilities have been described as only exploitable by a malicious program installed on the same server, therefore Speakerbus servers are considered at low risk of exploitation.

Speakerbus are assessing the patches for Microsoft and CentOS operating systems to understand the effect of the patches on the performance of our solutions.

We will update this statement with further advice and details on any product releases as more information becomes available.

Additional questions

More information on the vulnerabilities can be found at:

For further details, please contact your regional partner or our service desk: https://www.speakerbus.com/helpdesk/


© 2023 - Speakerbus