PowerShell Module for Detecting Vulnerabilities to Speculative Execution
Microsoft today (Jan. 4th, 2018) provided a PowerShell module to detect vulnerabilities related to Speculative Execution side-channel attacks. This vulnerability affects Intel, AMD and ARM processors, along with operating systems. You can review the Microsoft security advisory ADV18002 here.
This will install the module to your local machine
Install-Module SpeculationControl
*if you are having issues with install the module via the command above you can find the module on my github here.
Get-SpeculationControlSettings
The above command will analyze your system and will show you the vulnerabilities that are present on your system as seen below in the image.
Currently this module works on Windows 10 (RTM, 1511, 1607, 1703, 1709), Windows 8.1, and Windows 7 SP1. The following link (here) will show all some additional information from Microsoft about the module and fixes.
-Stuart
*Update: From William Lam’s Twitter Account (Thanks Erik) – Link
- See https://kb.vmware.com/s/article/52264 for VMware Appliances
- ESXi 5.5 patches in works, no ETA
- VC patch in works to deliver Microcode update for EVC, no ETA
- More detailed FAQ will be published in coming week now that Embargo is lifted
*Update 2: From William Lam’s Twitter Account Link
https://kb.vmware.com/s/article/52245 – New top level VMware KB has just been published covering all things related to #Spectre & #Meltdown