

SPECTRE MELTDOWN HOW TO
How to Download Dell Endpoint Security Suite Proįor more information on specific system requirements reference:.How to Download Dell Endpoint Security Suite Enterprise.How to Identify the Version of Dell Endpoint Security Suite Proįor information on downloading the latest software reference:.How to Identify the Version of Dell Threat Defense.How to Identify the Version of Dell Endpoint Security Suite Enterprise.Dell Endpoint Security Suite Pro v1.6.0 or later (Microsoft Windows only)įor more information on product versioning reference:.Dell Endpoint Security Suite Enterprise v1441 or later.If the system running a Dell Data Security solution also uses a malware prevention software, then Windows requires a registry key to allow updates to pull down automatically for the January 2018 Microsoft updates.ĭell Data Security has validated compatibility against the latest set of Microsoft patches from January 2018 as well as the fixes contained in Apple macOS High Sierra 10.13.2 with:
SPECTRE MELTDOWN DRIVERS
SPECTRE MELTDOWN FULL
Dell Full Disk Encryption (EMAgent) v18.16.1 or laterĭell Data Security recommends ensuring your clients are on the validated version or later prior to applying the January 2018 patches.įor information on downloading the latest software version reference:.Dell Encryption BitLocker Manager (EMAgent) v18.16.1 or later.Dell Encryption Personal for Self-Encrypting Drives (EMAgent) v8.16.1 or later.Dell Encryption Enterprise for Self-Encrypting Drives (EMAgent) v 8.16.1 or later.

SPECTRE MELTDOWN UPDATE
Microsoft January 2018 update release contains a series patches to help mitigate exploitation by the Meltdown/Spectre vulnerabilities.

The Dell Data Security software may help prevent exploits from being successful, but is not a substitute for taking the manufacturer’s recommended steps for remediation.

More information on these vulnerabilities and responses from other vendors, visit. For Dell systems, affected systems can be found at: Meltdown/Spectre (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754) impact on Dell Products. All customers should verify whether they are affected by going to the support sites of their hardware manufacturer. This means that a large range of products are affected from desktops and laptops to servers and storage, even smartphones. The issue is not specific to any one vendor and takes advantage of techniques commonly used in most of the modern processor architectures. This could lead to access to sensitive information stored in system memory. Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache. The vulnerabilities known as Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5715 /CVE-2017-5753) have been discovered in the central processing unit (CPU) performance feature called speculative execution.
