Start a Conversation

Unsolved

1

August 10th, 2023 23:03

Moderator

 • 

17K Posts

January 18th, 2018 05:00

A.M.

Dell releases bios updates on systems that are vulnerable. The Vostro 3750 is currently not on the list. Dell will update the information as it becomes available, including impacted products and remediation steps.

133 Posts

January 18th, 2018 07:00

This was a question I was wondering over. I have kept checking the official list and the 3750 seems conspicuous by its absence.

 

Moderator

 • 

17K Posts

January 18th, 2018 08:00

Mooly01,

At this time only the ones listed in the link below are vulnerable. Unfortunately, I have no information if  or when the 3750 will be added to the list.

Microprocessor Side-Channel Vulnerabilities (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754): Impact on Dell products

133 Posts

January 19th, 2018 07:00

I ran the PowerShell commands to test this vulnerability and as expected it appears vulnerable. Suggested action:

"Suggested actions * Install BIOS/firmware update provided by your device OEM that enables hardware support for the branch target injection mitigation."

Windows PowerShell
Copyright (C) Microsoft Corporation. All rights reserved.

PS C:\Windows\system32> Set-ExecutionPolicy Unrestricted -Scope Process -Force
PS C:\Windows\system32> Install-Module SpeculationControl -Force
PS C:\Windows\system32> Get-SpeculationControlSettings
Speculation control settings for CVE-2017-5715 [branch target injection]
For more information about the output below, please refer to https://support.microsoft.com/en-in/help/4074629

Hardware support for branch target injection mitigation is present: False
Windows OS support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is enabled: False
Windows OS support for branch target injection mitigation is disabled by system policy: False
Windows OS support for branch target injection mitigation is disabled by absence of hardware support: True

Speculation control settings for CVE-2017-5754 [rogue data cache load]

Hardware requires kernel VA shadowing: True
Windows OS support for kernel VA shadow is present: True
Windows OS support for kernel VA shadow is enabled: True
Windows OS support for PCID performance optimization is enabled: False [not required for security]

Suggested actions

 * Install BIOS/firmware update provided by your device OEM that enables hardware support for the branch target injection mitigation.


BTIHardwarePresent             : False
BTIWindowsSupportPresent       : True
BTIWindowsSupportEnabled       : False
BTIDisabledBySystemPolicy      : False
BTIDisabledByNoHardwareSupport : True
KVAShadowRequired              : True
KVAShadowWindowsSupportPresent : True
KVAShadowWindowsSupportEnabled : True
KVAShadowPcidEnabled           : False



PS C:\Windows\system32>

 

No Events found!

Top