Re: Uh
Well actually to exploit Spectre/Meltdown you'd first have to find a way to execute code on the management processor of the switch. In this case you usually have full control over that processor as you usually are either root or have no security boundaries between "userland" and "kernel".