It is no secret any more that all Intel CPUs released during the past decade are affected by a serious issue. A specially malformed code can be used to steal the private data of any other process, including sensitive data like passwords, security keys and so on. In this article, we will see how to find if your PC is affected by the issue.
If you are not aware about the Meltdown and Spectre vulnerabilities, we have covered them in detail in these two articles:
- Microsoft is rolling out emergency fix for Meltdown and Spectre CPU flaws
- Here are Windows 7 and 8.1 fixes for Meltdown and Spectre CPU flaws
In short, both Meltdown and Spectre vulnerabilities allow a process to read the private data of any other process, even from outside a virtual machine. This is possible due to Intel's implementation of how their CPUs prefetch data. This cannot be fixed by patching the OS only. The fix involves updating the OS kernel, as well as a CPU microcode update and possibly even a UEFI/BIOS/firmware update for some devices, to fully mitigate the exploits.
Recent research indicates that ARM64 and AMD CPUs are affected as well by the Spectre vulnerability, related to speculative execution.
Microsoft has already released a set of fixes for all supported operating systems. Mozilla today issued an updated version of Firefox 57, and Google will protect Chrome users with version 64.
For the current version Google Chrome, you can enable extra protection by enabling Full Site Isolation. Site Isolation offers a second line of defense to make such vulnerabilities less likely to succeed. It ensures that pages from different websites are always put into different processes, each running in a sandbox that limits what the process is allowed to do. It also blocks the process from receiving certain types of sensitive documents from other sites.
Google will update Chrome again (Version 64) by the end of the month to protect against exploitation of vulnerabilities related to Meltdown and Spectre. Version 64 of Chrome has already arrived on the beta channel.
Find if your PC is affected by Meltdown and Spectre vulnerabilities
Note: The instructions below are applicable to Windows 10, Windows 8.1 and Windows 7 SP1.
- Open PowerShell as administrator.
- Type the following command:
Install-Module SpeculationControl. This will install an extra module on your computer. Answer "Y" twice.
- Activate the installed module with the command:
- Now, execute the following cmdlet:
- In the output, see the enabled protections shown as "True".
Note: If you are getting the error message
"Import-Module : File C:\Program Files\WindowsPowerShell\Modules\SpeculationControl\1.0.1\SpeculationControl.psm1
cannot be loaded because running scripts is disabled on this system. ..."
Then change execution policy to unrestricted or bypass. Refer to the following article:
You are protected if all lines have the True value. Here is how my unpatched Windows 10 appears in the output:
Winaero greatly relies on your support. You can help the site keep bringing you interesting and useful content and software by using these options: