Meltdown and Spectre vulnerabilities – What can be done?

Neuigkeiten bei ICP Deutschland GmbH - Offizieller Partner von IEI
Meltdown and Spectre vulnerabilities – What can be done?

The Meltdown (CVE-2017-5754) and Spectre vulnerabilities (CVE-2017-5715 and CVE-2017-5753) are on everyone's lips. The source of the problem is the heart of every computing unit - the processor. This affects systems, PCs and motherboards based on x86 processors or an ARM chipset. Primarily affected are the processors of well-known manufacturers such as Intel, AMD and ARM.

The CPU manufacturers are already working vigorously on workarounds to close these vulnerabilities. As a measure, the update of the firmware (microcode) is provided. The new microcodes are supplied by motherboard manufacturers via BIOS updates. In addition, software and operating system manufacturers try to eliminate potential dangers through software updates.


What measures can you take?

- Be sure to follow all safety instructions and update recommendations of the hardware and software manufacturers.
- Allow automatic updates of your operating system and application software, and install deployed patches immediately.
- Install software (BIOS, updates, patches, etc.) only from trusted vendors.
- Contact us if you are unsure if your product is affected.


Further information can be found on the manufacturer pages:

- Processors: Intel / AMD / ARM
- Operating systems: Microsoft


We will keep you up to date about the vulnerabilities Spectre and Meltdown in our weekly newsletter.