
Microsoft Speculation Control Validation PowerShell Script
Determine firmware and OS vulnerably to Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753 & CVE-2017-5715) exploits
Determine firmware and OS vulnerably to Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753 & CVE-2017-5715) exploits
Microsoft Speculation Control Validation PowerShell Script 1.0.4
Determine firmware and OS vulnerably to Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753 & CVE-2017-5715) exploits
This package includes a WSUS deployable CAB file, complete with deployment and reporting rules.
Command line arguments <none> - Minimally interactive install /u - Unattended install /s - Silent install
Exit codes 320 - Not Vulnerable - The firmware and OS are patched 321 - Vulnerable - The firmware and OS are unpatched 322 - Vulnerable - The OS is patched but vulnerable because the firmware is unpatched 323 - Vulnerable - The firmware and OS are patched but the OS is vulnerable because of an OS policy 324 - Vulnerable - The firmware is patched, but the OS is unpatched 325 - Unable to parse the assessment results, please check the log file Common exit codes