
#1 See if the patch was applied to all machines How WDATP can help? Security Analytics can help. Some machines - Firmware patch from the CPU vendors for the microcode.OS Patch for all machines from Microsoft per the MSRC advisory.It will be eventually a two step conditional operation
#MICROSOFT SPECTRE MELTDOWN UPDATE#
We continue to monitor activity around this exploit and will update our defenses accordingly. That said, if an attacker is using this as part of campaign ATP is designed to detect across various stages prior to and after the exploitation. If this is exploited, is it detectable? It’s tricky.Įxploitation of this vulnerability is VERY hard to detect as it effectively exploits at the CPU level and therefore hard to be generically detected by AV/EDR solutions at large. Essentially if you are running a modern CPU (not only Intel) you are at risk. Simply put, if you have a host running multiple VMs, by running a non-admin code on the host machine you will potentially be able to see and harvest sensitive data belonging to apps running in the VMs.įor a good read on this go to this dedicated website - ĭesktop, Laptop, and Cloud computers may be affected, smartphone. In a nutshell, Meltdown and Spectre exploit critical vulnerabilities in modern processors allowing an attacker running user-level, non admin code, to steal kernel memory data breaking the fundamental isolation of layered endpoint security.


What is the fuss all about? This one is big. Details of it and what we can do is below in the context of the WDATP suite (both AV and EDR) On Jan 3rd, a new serious vulnerability was made public that affects most computers out there.
