Actions Required Per Windows Operating System to Fully Protect Against Spectre/Meltdown Vulnerabilities

For Microsoft’s operating systems, fully protecting against Spectre/Meltdown vulnerabilities may require additional actions. Use the table below to get an understanding of which protections are enabled by default versus those that might require further action.

 

OS CVE-2017-5715 CV-2017-5754 CVE-2018-3639
Windows 10 Enabled by default Enabled by default Disabled by default – see ADV180012
Windows Server 2016 Disabled by default – see KB4072698 Disabled by default – see KB4072698 Disabled by default – see ADV180012
Windows 8.1 Enabled by default Enabled by default Not applicable
Windows Server 2012 R2 Disabled by default – see KB4072698 Disabled by default – see KB4072698 Disabled by default – see ADV180012
Windows RT 8.1 Enabled by default Enabled by default Not applicable
Windows 7 Enabled by default Enabled by default Disabled by default – see ADV180012
Windows Server 2008 R2 Disabled by default – see KB4072698 Disabled by default – see KB4072698 Disabled by default – see ADV180012
Windows Server 2008 Enabled by default Enabled by default Not applicable

 

 


Looking for an awesome, no-nonsense technical conference for IT Pros, Developers, and DevOps? IT/Dev Connections kicks off in Dallas, Texas in 2018!

IT/Dev Connections