2. Relevant Products

VMware vCenter Server (VC)

VMware vSphere ESXi (ESXi)

VMware Workstation Pro / Player (Workstation)

VMware Fusion Pro / Fusion (Fusion)

3. Problem Description

New speculative-execution control mechanism for Virtual Machines



Updates of vCenter Server, ESXi, Workstation and Fusion virtualize the new speculative-execution control mechanism for Virtual Machines (VMs). As a result, a patched Guest Operating System (Guest OS) can remediate the Branch Target Injection issue (CVE-2017-5715). This issue may allow for information disclosure between processes within the VM.



To remediate CVE-2017-5715 in the Guest OS the following VMware and third party requirements must be met. Please note that these points are meant to be a brief overview. For a more in-depth explaination of the mitigation process please see VMware Knowledge Base Article 52085.

VMware Requirements



Deploy the updated version of vCenter Server listed in the table (if vCenter Server is used).

Deploy the ESXi patches and/or the new versions for Workstation or Fusion listed in the table.

Ensure that your VMs are using Hardware Version 9 or higher. For best performance, Hardware Version 11 or higher is recommended. VMware Knowledge Base Article 1010675 discusses Hardware Versions.

Third party Requirements

Deploy the Guest OS patches for CVE-2017-5715. These patches are to be obtained from your OS vendor.

Update the CPU microcode. Additional microcode is needed for your CPU to be able to expose the new MSRs that are used by the patched Guest OS. This microcode should be available from your hardware platform vendor.

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

