“Meltdown Patches ‘Melt Down’”

>>“Meltdown Patches ‘Melt Down’”

“Meltdown Patches ‘Melt Down’”

You may recall that a security fix was released back in January and February for the “Meltdown” flaw. It turns out that the fix itself, on Server 2008 R2 and Windows 7 x64, opened a new flaw. This one is just as bad as the prior meltdown bug allowing an attacker to escalate permissions and run arbitrary code. Microsoft has released a patch for this but applying has caused some systems to be knocked offline due to vNIC and NIC settings defaulting after the update has applied.

This is leaving many people in a bind. Should I patch and potentially loose network connectivity, or should I leave my system open to potential risk until a better patch is released? However, based on the number of exploits, an end of life date of 1/14/2020, and a long series of continued patching problems with Server 2008 R2 and Windows 7, it may be a good time to transition over to Windows Server 2016 and Windows 10.

Do you need help on making the shift? Contact one of our sales reps and learn what it would take to implement an up-to-date environment for your business.

Source: http://www.theregister.co.uk/2018/03/28/microsoft_windows_meltdown_patch_security_flaw/

 

2018-05-24T15:16:12+00:00