Meltdown and Spectre

Dan 46 Reputation points
2021-06-24T19:35:46.367+00:00

We were just recently notified about the Meltdown and Spectre vulnerability.

We have a 3rd party AV and it does show the vulnerability with most of our servers , all Windows 2012 and 2016 but all Windows 2019 servers are ok.

Even though the systems are all patched and they all have the registry key required for Microsoft to allow patches for this vulnerability, the AV still shows

that the vulnerability still exists.

I would appreciated it very much if someone can give me some recommendations on fixing these issues with the VM's and ESXi Hosts.

We are a virtualized shop using VmWare and Dell EMC VxRail.

Thanks in advance for your help!

Windows Server
Windows Server
A family of Microsoft server operating systems that support enterprise-level management, data storage, applications, and communications.
12,541 questions
0 comments No comments
{count} votes

Accepted answer
  1. Leon Laude 85,716 Reputation points
    2021-06-24T19:48:00.897+00:00

    Hi @Dan ,

    If you have followed all the steps mentioned in the article below from Microsoft on how to protect your Windows devices against the Meltdown and Spectre vulnerabilities, then you should be good. There are still some false positives with scanning software or antivirus/antimalware software that still complains about the vulnerability although the systems are patched fully.

    Protect your Windows devices against speculative execution side-channel attacks
    https://support.microsoft.com/en-us/topic/protect-your-windows-devices-against-speculative-execution-side-channel-attacks-a0b9f66c-f426-d854-fdbb-0e6beaeeee87

    If you have followed all the required steps, I would perhaps contact your antivirus provider and check with them closer.

    ----------

    If the reply was helpful please don't forget to upvote and/or accept as answer, thank you!

    Best regards,
    Leon

    1 person found this answer helpful.
    0 comments No comments

0 additional answers

Sort by: Most helpful