A list of registry changes can be found at. NCCIC recommends verifying your Windows Server version before downloading applicable patches and performing registry edits. NCCIC recommends administrators ensure that performance is monitored for critical applications and services, and work with their vendor(s) and service provider(s) to mitigate the effect, if possible.Īdditionally, NCCIC recommends users and administrators who rely on cloud infrastructure work with their CSP to mitigate and resolve any impacts resulting from host OS patching and mandatory rebooting.įor machines running Windows Server, a number of registry changes must be completed in addition to installation of the patches. In the case of Spectre, the vulnerability exists in CPU architecture rather than in software, and is not easily patched however, this vulnerability is more difficult to exploit.Īfter patching, performance impacts may vary, depending on use cases. NCCIC encourages users and administrators to refer to their hardware and software vendors for the most recent information. Branch Target Injection: CVE-2017-5715 (Spectre Variant 2).Bounds Check Bypass: CVE-2017-5753 (Spectre).
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |