Provide mitigation information and vulnerability assessment for customers using Security Explorer with regards to Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753 and CVE-2017-5715).
Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of data stored in the memory of other running programs. This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents.
Meltdown and Spectre work on personal computers, mobile devices, and in the cloud. Depending on the cloud provider's infrastructure, it might be possible to steal data from other customers.
Due to the nature of these vulnerabilities, which impact kernel mode functions, Security Explorer is indirectly affected however, only hardware and/or OS level patches can provide mitigation/remediation to these issues.
Quest recommends that customers follow the guidelines provided by platform providers such as Intel, Microsoft and VMWare to update their systems as relevant patches become available.
Please refer to the below links from platform providers for additional information:
Intel:
https://newsroom.intel.com/news/intel-responds-to-security-research-findings/
Microsoft:
VMWare:
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
© 2025 Quest Software Inc. ALL RIGHTS RESERVED. 利用規約 プライバシー Cookie Preference Center