Advertisement

Find If Your PC is Affected by Meltdown and Spectre CPU Vulnerabilities

It is no secret any more that all Intel CPUs released during the past decade are affected by a serious issue. A specially malformed code can be used to steal the private data of any other process, including sensitive data like passwords, security keys and so on. In this article, we will see how to find if your PC is affected by the issue.

Advertisеment

If you are not aware about the Meltdown and Spectre vulnerabilities, we have covered them in detail in these two articles:

In short, both Meltdown and Spectre vulnerabilities allow a process to read the private data of any other process, even from outside a virtual machine. This is possible due to Intel's implementation of how their CPUs prefetch data. This cannot be fixed by patching the OS only. The fix involves updating the OS kernel, as well as a CPU microcode update and possibly even a UEFI/BIOS/firmware update for some devices, to fully mitigate the exploits.

Recent research indicates that ARM64 and AMD CPUs are affected as well by the Spectre vulnerability, related to speculative execution.

Available fixes

Microsoft has already released a set of fixes for all supported operating systems. Mozilla today issued an updated version of Firefox 57, and Google will protect Chrome users with version 64.

For the current version Google Chrome, you can enable extra protection by enabling Full Site Isolation. Site Isolation offers a second line of defense to make such vulnerabilities less likely to succeed. It ensures that pages from different websites are always put into different processes, each running in a sandbox that limits what the process is allowed to do. It also blocks the process from receiving certain types of sensitive documents from other sites.

Google will update Chrome again (Version 64) by the end of the month to protect against exploitation of vulnerabilities related to Meltdown and Spectre. Version 64 of Chrome has already arrived on the beta channel.

Find if your PC is affected by Meltdown and Spectre vulnerabilities

Note: The instructions below are applicable to Windows 10, Windows 8.1 and Windows 7 SP1.

  1. Open PowerShell as administrator.
  2. Type the following command: Install-Module SpeculationControl. This will install an extra module on your computer. Answer "Y" twice. Install PS Module Windows 10
  3. Activate the installed module with the command: Import-Module SpeculationControl.
  4. Now, execute the following cmdlet: Get-SpeculationControlSettings.
  5. In the output, see the enabled protections shown as "True".

Note: If you are getting the error message

"Import-Module : File C:\Program Files\WindowsPowerShell\Modules\SpeculationControl\1.0.1\SpeculationControl.psm1
cannot be loaded because running scripts is disabled on this system. ..."

Then change execution policy to unrestricted or bypass. Refer to the following article:

How to Change PowerShell Execution Policy in Windows 10

You are protected if all lines have the True value. Here is how my unpatched Windows 10 appears in the output:Windows 10 Check If PC Is Affected By CPU Vulnerabilities

That's it.

Source: Microsoft

Support us

Winaero greatly relies on your support. You can help the site keep bringing you interesting and useful content and software by using these options:

If you like this article, please share it using the buttons below. It won't take a lot from you, but it will help us grow. Thanks for your support!

Advertisеment

Author: Sergey Tkachenko

Sergey Tkachenko is a software developer who started Winaero back in 2011. On this blog, Sergey is writing about everything connected to Microsoft, Windows and popular software. Follow him on Telegram, Twitter, and YouTube.

14 thoughts on “Find If Your PC is Affected by Meltdown and Spectre CPU Vulnerabilities”

  1. Без знаний всё равно непонятно что смотреть
    Speculation control settings for CVE-2017-5715 [branch target injection]

    Hardware support for branch target injection mitigation is present: False
    Windows OS support for branch target injection mitigation is present: True
    Windows OS support for branch target injection mitigation is enabled: False
    Windows OS support for branch target injection mitigation is disabled by system policy: False
    Windows OS support for branch target injection mitigation is disabled by absence of hardware support: True

    Speculation control settings for CVE-2017-5754 [rogue data cache load]

    Hardware requires kernel VA shadowing: True
    Windows OS support for kernel VA shadow is present: True
    Windows OS support for kernel VA shadow is enabled: True
    Windows OS support for PCID performance optimization is enabled: False [not required for security]

    Suggested actions

    * Install BIOS/firmware update provided by your device OEM that enables hardware support for the branch target injection mitigation.

    BTIHardwarePresent : False
    BTIWindowsSupportPresent : True
    BTIWindowsSupportEnabled : False
    BTIDisabledBySystemPolicy : False
    BTIDisabledByNoHardwareSupport : True
    KVAShadowRequired : True
    KVAShadowWindowsSupportPresent : True
    KVAShadowWindowsSupportEnabled : True
    KVAShadowPcidEnabled : False

  2. Far as I got on a Lenovo laptop

    System SKU LENOVO_MT_80NW_BU_idea_FM_Lenovo ideapad Y700 Touch-15ISK
    Processor Intel(R) Core(TM) i7-6700HQ CPU @ 2.60GHz, 2601 Mhz, 4 Core(s), 8 Logical Processor(s)
    BIOS Version/Date LENOVO CDCN54WW, 6/13/2017

    Speculation control settings for CVE-2017-5754 [rogue data cache load]

    Hardware requires kernel VA shadowing: True
    Windows OS support for kernel VA shadow is present: True
    Windows OS support for kernel VA shadow is enabled: True
    Windows OS support for PCID performance optimization is enabled: True [not required for security]

    Suggested actions

    * Install BIOS/firmware update provided by your device OEM that enables hardware support for the branch target injection mitigation.

    BTIHardwarePresent : False
    BTIWindowsSupportPresent : True
    BTIWindowsSupportEnabled : False
    BTIDisabledBySystemPolicy : False
    BTIDisabledByNoHardwareSupport : True
    KVAShadowRequired : True
    KVAShadowWindowsSupportPresent : True
    KVAShadowWindowsSupportEnabled : True
    KVAShadowPcidEnabled : True

  3. System SKU LENOVO_MT_80NW_BU_idea_FM_Lenovo ideapad Y700 Touch-15ISK
    Processor Intel(R) Core(TM) i7-6700HQ CPU @ 2.60GHz, 2601 Mhz, 4 Core(s), 8 Logical Processor(s)
    BIOS Version/Date LENOVO CDCN54WW, 6/13/2017

    PS C:\WINDOWS\system32> Get-SpeculationControlSettings
    Speculation control settings for CVE-2017-5715 [branch target injection]

    Hardware support for branch target injection mitigation is present: False
    Windows OS support for branch target injection mitigation is present: True
    Windows OS support for branch target injection mitigation is enabled: False
    Windows OS support for branch target injection mitigation is disabled by system policy: False
    Windows OS support for branch target injection mitigation is disabled by absence of hardware support: True

    Speculation control settings for CVE-2017-5754 [rogue data cache load]

    Hardware requires kernel VA shadowing: True
    Windows OS support for kernel VA shadow is present: True
    Windows OS support for kernel VA shadow is enabled: True
    Windows OS support for PCID performance optimization is enabled: True [not required for security]

    Suggested actions

    * Install BIOS/firmware update provided by your device OEM that enables hardware support for the branch target injection mitigation.

    BTIHardwarePresent : False
    BTIWindowsSupportPresent : True
    BTIWindowsSupportEnabled : False
    BTIDisabledBySystemPolicy : False
    BTIDisabledByNoHardwareSupport : True
    KVAShadowRequired : True
    KVAShadowWindowsSupportPresent : True
    KVAShadowWindowsSupportEnabled : True
    KVAShadowPcidEnabled : True

  4. А какой смысл в этом цмдлете вообше?

    Если патчи установлены на Windows, значит уже пропатчено всё. А если не установлены, тогда нужно установить на все уязвимые машины.

    На относительно не новых машинах обновления биос всё равно уже не дождаться…

  5. Not all fixed Win10 Build 16299.192, and no Bios Update is avaible (HP Envy), so i have to be patient is good enough?

    PS C:\WINDOWS\system32> get-speculationControlSettings
    Speculation control settings for CVE-2017-5715 [branch target injection]

    Hardware support for branch target injection mitigation is present: False
    Windows OS support for branch target injection mitigation is present: True
    Windows OS support for branch target injection mitigation is enabled: False
    Windows OS support for branch target injection mitigation is disabled by system policy: False
    Windows OS support for branch target injection mitigation is disabled by absence of hardware support: True

    Speculation control settings for CVE-2017-5754 [rogue data cache load]

    Hardware requires kernel VA shadowing: True
    Windows OS support for kernel VA shadow is present: True
    Windows OS support for kernel VA shadow is enabled: True
    Windows OS support for PCID performance optimization is enabled: True [not required for security]

    Suggested actions

    * Install BIOS/firmware update provided by your device OEM that enables hardware support for the branch target injection mitigation.

    BTIHardwarePresent : False
    BTIWindowsSupportPresent : True
    BTIWindowsSupportEnabled : False
    BTIDisabledBySystemPolicy : False
    BTIDisabledByNoHardwareSupport : True
    KVAShadowRequired : True
    KVAShadowWindowsSupportPresent : True
    KVAShadowWindowsSupportEnabled : True
    KVAShadowPcidEnabled : True

  6. I can’t install the module SpeculationControl. I have Windows 8.1 x64 SL(RUS), PowerShell 4.0.
    PC c:\windows\system32> Install-Module SpeculationControl
    Install-Module : Имя “Install-Module” не распознано как имя командлета, функции, файла сценария или выполняемой програм
    мы. Проверьте правильность написания имени, а также наличие и правильность пути, после чего повторите попытку…
    What can I do?

          1. This package is also intended only for Windows 8.1 Pro and Enterprise.
            How do I find out the version of the Microsoft .NET Framework installed on my Windows 8.1?

Leave a Reply

Your email address will not be published.

css.php
Using Telegram? Subscribe to the blog channel!
Hello. Add your message here.