These exploits are used to try and steal information indirectly from a system. They do not cause the system to crash or malfunction.
1) An attacker would need to install and run their code on your device.
2) The attacker would need to have access to your code to make an exploit
3) The exploit is highly dependent on cache manipulation to try and “steal information” indirectly. This means system dynamics could make it difficult to exploit. So the attacker’s code would have to be customized for a particular system (It would be different for each product, including software and services running).
Read the originating white paper for more information.
Our FGR, HTPlus products and the new ZumLink Z9-T/C products do not have the type of hardware architecture that would be vulnerable.