FAQ: CVE-2017-5753, CVE-2017-5715 (Spectre), and CVE-2017-5754 (Meltdown)

Do Spectre or Meltdown vulnerabilities impact VMware AirWatch services? 

While the VMware AirWatch applications and web services are not affected, Spectre and Meltdown affect the underlying CPU architecture of most modern computer systems. As a result, the infrastructure running AirWatch cloud services is impacted, and VMware is taking action to remediate affected services as described here.  


Are AirWatch services that run Linux (ex: Tunnel) impacted?

While the AirWatch services themselves are not impacted and require no patch, the underlying operating system components may be. If you are a SaaS customer, any Linux components will be patched as part of the SaaS remediation effort. For On-Premises customers utilizing components such as SEG, Tunnel, etc. please apply the update provided by the OS vendor.


For On-Premises environments, is any of the AirWatch-hosted infrastructure (ex: Autodiscovery, etc.) impacted by Spectre or Meltdown vulnerabilities?

If you are an On-Premises customer utilizing AirWatch cloud services (such as Autodiscovery), these services will be addressed as part of the effort described in the knowledge base article here. Customers should still apply the operating system patches for On-Premises components provided by your OS vendor. 


Once patched, is any performance impact expected?

VMware AirWatch is still in the process of evaluating all impacts on affected platforms. Our teams will provide additional follow-up information if mitigation or resolution steps result in adverse effects on product performance.


For additional information on CVE-2017-5753, CVE-2017-5715 (Spectre), and CVE-2017-5754 (Meltdown), please refer to our knowledge base article here

Have more questions? Submit a request


Article is closed for comments.