How to know if your PC is protected against Meltdown and Spectre

spectre www.wonkacreations.com
by

We have spent a week talking about Meltdown and Spectre, the serious security flaws that affect practically all modern processors. The first of the vulnerabilities, Meltdown, affects the Intel CPUs and implies having an open door to data from the system’s memory, which could slow down the computer with the solution. The second, Specter, affects Intel, AMD and ARM allowing the entry of other applications into memory.

Since the exploitation of these errors could allow an attacker to obtain stored passwords, photos, emails, instant messages and even documents according to the researchers, in addition to the updates Microsoft has announced the launch of a PowerShell script that users and professionals can execute in their systems to check if the protections against these important threats are enabled. We should only follow the following steps knowing what we are doing

Guide to check if you are vulnerable to Meltdown and Spectre

  1. Press the Windows key or enter the Start menu.
  2. Search Windows PowerShell and right click on the result to select “Run as administrator”.
  3. Install the PowerShell module in question by typing Install-Module SpeculationControl and press the enter key.
  4. If the activation or download of NuGet is requested, type S (and in case you have the system in English) and press enter.
  5. Surely the installation confirmation will be requested from an untrusted repository, it should be done by rewriting S and pressing enter.
  6. To avoid problems with the execution directive, you must write $ SaveExecutionPolicy = Get-ExecutionPolicy and press enter; in the end we will reverse this change.
  7. To make sure that the command is imported into the execution, Set-ExecutionPolicy RemoteSigned -Scope Currentuser will be written and then enter.
  8. We will be asked for confirmation of the execution policy change, and we will press S followed by intro.
  9. We will import the module by entering Import-Module SpeculationControl followed by an intro.
  10. Finally, we will execute the PowerShell module to verify that the protections are enabled by typing Get-SpeculationControlSettings and pressing, again, the enter key.
  11. Finally, remember that to revert the execution directive to the original state we must write Set-ExecutionPolicy $ SaveExecutionPolicy -Scope Currentuser and press the enter key. Next, we confirm the reversal by entering S and pressing intro again.

Once this point has been reached, the Windows PowerShell window will show the result of the check we have carried out, indicating in a very illustrative way if the different existing protections are enabled.

Under the heading “Speculation control settings for CVE-2017-5715 [branch target injection]” we find references to the Specter vulnerability and under “Specification control settings for CVE-2017-5754 [rogue data cache load]” those corresponding to Meltdown. The enabled protections will show the “True” value in the results, while the “False” value will be disabled.

If you only installed on your computer the emergency patch that issued Windows 10 on January 3, which only deals with Meltdown, the values ​​in the second section should indicate “True” and be displayed in green, except for the first item, that appears in white.

To get the positive results in the first one, referring to the worst of the vulnerabilities, Specter, it would be necessary to install the BIOS / firmware update provided by the manufacturer of the device that allows hardware support.

After updating Windows 10 and updating the BIOS or firmware, the items in both sections should appear with the value “True” and highlighted in green.

 

What to do if updates have not been received on your device

If you have not received the Microsoft OS update and you have already tried running Windows Update without results, check that your antivirus is not blocking the reception of the patch. If your processor is an AMD, be patient because the system update has been suspended for the time being. spectre

To update the BIOS or firmware you should visit the manufacturer’s support website looking for what you can do according to the model you have. Also, be sure to update any other computer software to be even more secure and keep up with the latest news about these security flaws. spectre

Fuente: Genbeta

Share

Leave a Reply

Your email address will not be published. Required fields are marked *

19 − fourteen =