Introducing Trend Micro Identity Protection! Experience the security you deserve – begin your 30-day free trial now! Learn more

tm_jb's profileBrand User



166 Messages


3.4K Points

Wednesday, January 10th, 2018 3:41 AM


Windows Meltdown-Spectre Vulnerability

[What is the Meltdown-Spectre Vulnerability?]

Meltdown, designated as CVE-2017-5754, can enable hackers to gain privileged access to parts of a computer’s memory used by an application/program and the operating system (OS). Meltdown affects Intel processors.

Spectre, designated as CVE-2017-5753 and CVE-2017-5715, can allow attackers to steal information leaked in the kernel/cached files or data stored in the memory of running programs, such as credentials (passwords, login keys, etc.). Spectre reportedly affects processors from Intel, Advanced Micro Devices (AMD), and Advanced RISC Machine (ARM).

In short, these vulnerabilities affect certain chips from Intel, AMD, and ARM. All Windows operating systems are potentially vulnerable. Devices running other operating systems such as Android, Chrome, iOS, and MacOS are also affected.

Trend Micro is aware of the Meltdown-Spectre vulnerabilities. However, since these are on the OS/Processor level, we rely on OS Updates to protect against these vulnerabilities. The update we released is to enable machines to receive the said updates. 

Here are some links that can provide additional information:

[Trend Micro Security Blog posts]

Fixing the Meltdown and Spectre vulnerabilities

A Rundown of Microsoft’s New Patch Deployment Process

Meltdown and Spectre Intel Processor Vulnerabilities: What You Need to Know

[Microsoft's Support KB]

Protect your Windows devices against Spectre and Meltdown
No Responses!

Need Help?

Ask the Community

Latest Tech Insights