• ×
    Information
    Need Windows 11 help?
    Check documents on compatibility, FAQs, upgrade information and available fixes.
    Windows 11 Support Center.
  • post a message
  • ×
    Information
    Need Windows 11 help?
    Check documents on compatibility, FAQs, upgrade information and available fixes.
    Windows 11 Support Center.
  • post a message
Guidelines
Are you having HotKey issues? Click here for tips and tricks.
Check out our WINDOWS 11 Support Center info about: OPTIMIZATION, KNOWN ISSUES, FAQs, VIDEOS AND MORE.
HP Recommended
HP ProDesk 400 G3 Microtower PC
Microsoft Windows 7 (32-bit)

This is regarding the Meltdown/Spectre Vulnerbailities

 

I have updated the required Windows 7 2018-01 Motnhly rollup & Bios Update in the HP Prodesk 400 G2

 

after updating I have used the Microsoft Powershell script(SpeculationControlSettings) to check the  Status of the PC if it is secured or not. To my uderstanding the MS has mentioned that all the values to be true, but iam getting the below two options as false

 

Windows OS support for kernel VA shadow is present: False
Windows OS support for kernel VA shadow is enabled: False

 

 

So I would like to know that is this HP PC is secured or not, or should i need to disable or enable any options?

 

I have noticed that this Kernel shadow value is false in all 32bit OS.

 

1 ACCEPTED SOLUTION

Accepted Solutions
HP Recommended

Hi,

 

I found that Microsoft has posted that the PC's with x86 are not protected, find the below article

 

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002

 

7. I have an x86 architecture and the PowerShell Verification output indicates that I am not fully protected from these speculative execution side-channel vulnerabilities. Will Microsoft provide complete protections in the future?

Addressing a hardware vulnerability with a software update presents significant challenges and mitigations for older operating systems that require extensive architectural changes. The existing 32 bit update packages listed in this advisory fully address CVE-2017-5753 and CVE-2017-5715, but do not provide protections for CVE-2017-5754 at this time. Microsoft is continuing to work with affected chip manufacturers and investigate the best way to provide mitigations for x86 customers, which may be provided in a future update.

 

Thanks..

 

 

 

View solution in original post

1 REPLY 1
HP Recommended

Hi,

 

I found that Microsoft has posted that the PC's with x86 are not protected, find the below article

 

https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002

 

7. I have an x86 architecture and the PowerShell Verification output indicates that I am not fully protected from these speculative execution side-channel vulnerabilities. Will Microsoft provide complete protections in the future?

Addressing a hardware vulnerability with a software update presents significant challenges and mitigations for older operating systems that require extensive architectural changes. The existing 32 bit update packages listed in this advisory fully address CVE-2017-5753 and CVE-2017-5715, but do not provide protections for CVE-2017-5754 at this time. Microsoft is continuing to work with affected chip manufacturers and investigate the best way to provide mitigations for x86 customers, which may be provided in a future update.

 

Thanks..

 

 

 

† The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the <a href="https://www8.hp.com/us/en/terms-of-use.html" class="udrlinesmall">Terms of Use</a> and <a href="/t5/custom/page/page-id/hp.rulespage" class="udrlinesmall"> Rules of Participation</a>.