Notes of a scripter

PowerShell Module for Speculative Execution Detection

PowerShell Module for Detecting Vulnerabilities to Speculative Execution

Microsoft today (Jan. 4th, 2018) provided a PowerShell module to detect  vulnerabilities related to Speculative Execution side-channel attacks.  This vulnerability affects  Intel, AMD and ARM processors, along with operating systems.  You can review the Microsoft security advisory ADV18002 here.

This will install the module to your local machine

Install-Module SpeculationControl

*if you are having issues with install the module via the command above you can find the module on my github here.

Get-SpeculationControlSettings

The above command will analyze your system and will show you the vulnerabilities that are present on your system as seen below in the image.

Currently this module works on Windows 10 (RTM, 1511, 1607, 1703, 1709), Windows 8.1, and Windows 7 SP1. The following link (here) will show all some additional information from Microsoft about the module and fixes.

-Stuart

*Update: From William Lam’s Twitter Account (Thanks Erik) – Link

*Update 2: From William Lam’s Twitter Account Link

kb.vmware.com/s/article/52245 – New top level VMware KB has just been published covering all things related to #Spectre & #Meltdown

Exit mobile version