Meltdown/Spectre on Windows server 2016

jellekamma 221 Reputation points
2022-01-03T14:09:11.533+00:00

Hi,

We are running Windows 2016 VM's on ESXi 6.7 servers on Lenovo Hardware. We patch everything very often. Now we have a qualys agent scanning our VMS.
One of the items that pop up is the spectre meltdown issues.
I was sure this was not an issue anymore since we patch the Hypervisors and Windows and the hardware very often.I have upgraded the VM hardware version to 11.x and we have Patched the Lenovo servers firmware and Bios. However I cannot find what there is left to do.
When I run the powershell script this pops up. I have enabled all the registry items that I thought were applicable for me. But no success.

For more information about the output below, please refer to https://support.microsoft.com/help/4074629

Speculation control settings for CVE-2017-5715 [branch target injection]

Hardware support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is enabled: False
Windows OS support for branch target injection mitigation is disabled by system policy: True
Windows OS support for branch target injection mitigation is disabled by absence of hardware support: False

Speculation control settings for CVE-2017-5754 [rogue data cache load]

Hardware requires kernel VA shadowing: False

Speculation control settings for CVE-2018-3639 [speculative store bypass]

Hardware is vulnerable to speculative store bypass: True
Hardware support for speculative store bypass disable is present: True
Windows OS support for speculative store bypass disable is present: True
Windows OS support for speculative store bypass disable is enabled system-wide: True

Speculation control settings for CVE-2018-3620 [L1 terminal fault]

Hardware is vulnerable to L1 terminal fault: False

Speculation control settings for MDS [microarchitectural data sampling]

Windows OS support for MDS mitigation is present: True
Hardware is vulnerable to MDS: False

Suggested actions

BTIHardwarePresent : True
BTIWindowsSupportPresent : True
BTIWindowsSupportEnabled : False
BTIDisabledBySystemPolicy : True
BTIDisabledByNoHardwareSupport : False
BTIKernelRetpolineEnabled : False
BTIKernelImportOptimizationEnabled : False
KVAShadowRequired : False
KVAShadowWindowsSupportPresent : True
KVAShadowWindowsSupportEnabled : False
KVAShadowPcidEnabled : False
SSBDWindowsSupportPresent : True
SSBDHardwareVulnerable : True
SSBDHardwarePresent : True
SSBDWindowsSupportEnabledSystemWide : True
L1TFHardwareVulnerable : False
L1TFWindowsSupportPresent : True
L1TFWindowsSupportEnabled : False
L1TFInvalidPteBit : 0
L1DFlushSupported : True
MDSWindowsSupportPresent : True
MDSHardwareVulnerable : False
MDSWindowsSupportEnabled : False

the agent comes with these messages:

Customers are advised to refer to ADV180012 for more details pertaining to this vulnerability.

Please refer to the section "Enabling protections on the server" from the Microsoft link for Server Operating systems, Microsoft link for Client Operating Systems for more details

Patch:
Following are links for downloading patches to fix the vulnerabilities:

ADV180012

ADV180012

and:

"Customers are advised to refer to ADV180002 for more details pertaining to this vulnerability.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

KB4056897

KB4056890

KB4056892

KB4056898
"

Windows Server 2016
Windows Server 2016
A Microsoft server operating system that supports enterprise-level management updated to data storage.
2,508 questions
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Anonymous
    2022-01-03T14:15:06.737+00:00

    Read on here.
    https://support.microsoft.com/en-us/topic/windows-server-guidance-to-protect-against-speculative-execution-side-channel-vulnerabilities-2f965763-00e2-8f98-b632-0d96f30c8c8e

    there were some work-around patching but ultimately the hardware vendors provided firmware updates to mitigate. So I'd check with the hardware vendor about this.

    --please don't forget to upvote and Accept as answer if the reply is helpful--


  2. jellekamma 221 Reputation points
    2022-01-04T14:05:45.667+00:00

    I am checking some things out, I already used the registry fixes in your link. However Qualys uses different settings. I will have to wait for a new report.

    https://success.qualys.com/discussions/s/question/0D52L00004TnxXVSAZ/microsoft-windows-security-update-registry-key-configuration-missing-adv180012-spectremeltdown-variant-4


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.