Like I told you, it's all about having multi-core CPUs and race conditions.
First came Spectre and Meltdown.
Now we've got Foreshadow, which can grab protected information even under virtual machine and hypervisor situations. (That is a good overview paper, but you can also get some random discussion from Twitter.)
But this stuff isn't new. Apparently someone found a four byte jump from ring 3 (user space) to ring 0 (the root kernel) in old x86s. (Don't know why they bothered, since almost everyone ran everything in root mode anyway, but ...)
VMWare poke one of my admins this morning with just such a warning or to be more succinct a corporate CYA moment.
Since following this vulnerability since last week and see the natural progression from theory to NMap to some exploit code but nothing wide spread yet or is this actually being exploited under our noses without notice?
Thus far it appears that you'd have to be near the hypervisor itself while reading a vulnerable machine through a tunnel while conversing with a free range unicorn under cover of darkness.
Thus far I am not seeing the opportunity to win this trifecta several times in a row or at least in this environment.
Could someone give me a reasonable scenario or example of exploitation, please?
B/Eads