The Meltdown and Spectre kernel vulnerabilities are unlike any we’ve dealt with before. Even though they are hardware issues, the patching efforts are led by software companies working with the chip manufacturers and researchers. To compound the remediation efforts, these vulnerabilities impact Windows, Mac, and Linux operating systems, and since the flaw dates back more than 20 years, nearly every version of the operating systems is at risk, even those no longer supported with updates.
Patching your infrastructure against these vulnerabilities has turned out to be a difficult task and because of the complexity, the information provided has not been straightforward. Patches have been released in an ad hoc fashion, and some of them have done more damage than good.
To address this situation, Automox has created a dedicated page within its cloud based patching solution specifically for the Meltdown and Spectre vulnerabilities. The page identifies the latest patch releases and displays which endpoints in your infrastructure require which patches. In a single view, you’ll be able to see all of your Windows, Mac, and Linux endpoints, by operating systems version, so you can apply the correct patches with the click of a button.
Automox’s cloud-based solution enables users to patch on-demand or as part of their patch testing process, simplifying three of the largest challenges IT Manager face when addressing new vulnerabilities:
- Quickly identifying which endpoints are vulnerable
- Easily finding the appropriate patches
- Deploying the patches in a timely fashion across all endpoints
While Automox does this for every patch released across Windows, Mac, Linux, and 3rd party software applications, Meltdown and Spectre present a unique challenge. The dedicated page further minimizes the time and resources required to remediate these vulnerabilities.
To keep up to date on all of the latest patch releases, please visit this post on our blog. Or if you have questions about Automox and how we can help you address Meltdown, Spectre, and other vulnerabilities, you can always reach us via email.