Windows Meltdown-Spectre Vulnerability

  • 1
  • Article
  • Updated 6 months ago
  • (Edited)
[What is the Meltdown-Spectre Vulnerability?]

Meltdown, designated as CVE-2017-5754, can enable hackers to gain privileged access to parts of a computer’s memory used by an application/program and the operating system (OS). Meltdown affects Intel processors.

Spectre, designated as CVE-2017-5753 and CVE-2017-5715, can allow attackers to steal information leaked in the kernel/cached files or data stored in the memory of running programs, such as credentials (passwords, login keys, etc.). Spectre reportedly affects processors from Intel, Advanced Micro Devices (AMD), and Advanced RISC Machine (ARM).

In short, these vulnerabilities affect certain chips from Intel, AMD, and ARM. All Windows operating systems are potentially vulnerable. Devices running other operating systems such as Android, Chrome, iOS, and MacOS are also affected.

Trend Micro is aware of the Meltdown-Spectre vulnerabilities. However, since these are on the OS/Processor level, we rely on OS Updates to protect against these vulnerabilities. The update we released is to enable machines to receive the said updates. 

Here are some links that can provide additional information:

[Trend Micro Security Blog posts]

Fixing the Meltdown and Spectre vulnerabilities

A Rundown of Microsoft’s New Patch Deployment Process

Meltdown and Spectre Intel Processor Vulnerabilities: What You Need to Know

[Microsoft's Support KB]

Protect your Windows devices against Spectre and Meltdown
Photo of TM_JB

TM_JB, Official Rep

  • 3,354 Points 3k badge 2x thumb

Posted 6 months ago

  • 1

There are no replies.

This conversation is no longer open for comments or replies.