diff --git a/verification/README.md b/verification/README.md index f519a30..ff4e989 100644 --- a/verification/README.md +++ b/verification/README.md @@ -6,7 +6,7 @@ Verification of mitigations is currently being developed for operating systems a * [2. Linux](#linux) * [3. Mac OS](#macos) * [4. iOS](#ios) -* [5. Android](#and) +* [5. Android](#android) ## 1. Windows Verification of Windows operating system and application mitigations are being developed as custom Nessus audit files. Custom audit files can be leveraged by using a [Policy Compliance](https://docs.tenable.com/nessus/7_0/Content/ScanAndPolicyTemplates.htm) scan in Nessus. DoD components can acquire Nessus via the [ACAS](https://www.disa.mil/cybersecurity/network-defense/acas) program. @@ -16,20 +16,26 @@ See the [Windows page](./windows/README.md) for more information. ### 1.1 PowerShell Microsoft has introduced a PowerShell module that reports on a system's vulnerability to several variants of Spectre and Meltdown. Color-coded, true or false output is returned. The presence of mitigations in BIOS/UEFI firmware and the Windows OS kernel are indicated. The tool also provides suggested actions if a missing mitigation is detected. Use the following commands from an administrator-elevated PowerShell terminal: -Install-Module SpeculationControl -Import-Module SpeculationControl -Get-SpeculationControlSettings +> Install-Module SpeculationControl + +> Import-Module SpeculationControl + +> Get-SpeculationControlSettings + +For more specifics, see the bottom section of [this Microsoft information post](https://support.microsoft.com/en-us/help/4072698/windows-server-speculative-execution-side-channel-vulnerabilities-prot). ### 1.2 Products +Products from [Eclypsium](https://eclypsium.com/) and [Tenable](https://www.tenable.com/blog/the-first-major-security-logos-of-2018-spectre-and-meltdown-vulnerabilities) are known to report on the status of Spectre and Meltdown vulnerability and mitigations. Other anti-malware, firmware inspection, and intrusion detection products may also offer detection capabilities -- consult with the software vendor to confirm. ### 1.3 Open Source Scripts + * [Alex Ionescu (ionescu007)'s Spectre and Meltdown Checker](https://github.com/ionescu007/SpecuCheck) ## 2. Linux ### 2.1 Terminal Commands #### 2.1.1 Red Hat and Ubuntu Kernel page tablet isolation is an indicator of Spectre and Meltdown patch application. Use the following command to query the status of isolation on Red Hat Enterprise Linux (RHEL) and Ubuntu devices: -cat /boot/config-3.10.0-957.12.2.el7.x86_64 | grep CONFIG_PAGE_TABLE_ISOLATION +> cat /boot/config-3.10.0-957.12.2.el7.x86_64 | grep CONFIG_PAGE_TABLE_ISOLATION Y indicates that patching is compiled into the kernel. N indicates that software vulnerability may exist. @@ -39,12 +45,13 @@ Red Hat Enterprise Linux (RHEL) provides a package and script for checking the s #### 2.1.3 Ubuntu Only Ubuntu provides a package named "spectre-meltdown-checker" that can be downloaded, installed, and executed on an endpoint. After installing the package, simply execute the following from a terminal: -spectre-meltdown-checker +> spectre-meltdown-checker ### 2.2 Products +Products from [Eclypsium](https://eclypsium.com/) and [Tenable](https://www.tenable.com/blog/the-first-major-security-logos-of-2018-spectre-and-meltdown-vulnerabilities) are known to report on the status of Spectre and Meltdown vulnerability and mitigations. Other anti-malware, firmware inspection, and intrusion detection products may also offer detection capabilities -- consult with the software vendor to confirm. ### 2.3 Open Source Scripts -[Stéphane Lesimple (speed47)'s Spectre and Meltdown Checker](https://github.com/speed47/spectre-meltdown-checker) + * [Stéphane Lesimple (speed47)'s Spectre and Meltdown Checker](https://github.com/speed47/spectre-meltdown-checker) ## 3. Mac OS Check the current version of Mac OS. The version number must be at least [10.13.2](https://support.apple.com/en-us/HT208394).