Mitigate Meltdown and Spectre Processor Vulnerabilities
The Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753 & CVE-2017-5715) vulnerabilities potentially impact all major processor vendors.
Meltdown affects Intel chips and one ARM processor, allowing any application to access all system memory, including memory allocated for the kernel. Mitigation requires OS patches and firmware updates.
Spectre impacts Intel, AMD, and ARM chips, allowing an application to force another application to access arbitrary portions of its memory, which can then be read through a side channel. Mitigation will require microcode updates in order to fully mitigate, in addition to software patches.
Qualys Cloud Platform
The Qualys Cloud Platform and integrated Threat Protection and Asset Inventory apps can help you:
- Quickly and easily visualize Spectre and Meltdown CPU vulnerabilities within your global IT environment
- Automate detection of critical vulnerabilities
- Track remediation progress as you patch against Spectre and Meltdown