Meltdown and Spectre CVE-2017-5754, CVE-2017-5753, and CVE-2017-5715

  • 7022579
  • 19-Jan-2018
  • 13-Apr-2018


Change Guardian 4x and 5x


Meltdown and Spectre exploit critical vulnerabilities in modern processors. These hardware vulnerabilities allow programs to steal data which is currently processed on the computer. While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hold of secrets stored in the memory of other running programs. This might include your passwords stored in a password manager or browser, your personal photos, emails, instant messages and even business-critical documents. 
Meltdown and Spectre work on personal computers, mobile devices, and in the cloud. Depending on the cloud provider's infrastructure, it might be possible to steal data from other customers.


These vulnerabilities are resolved by patches provided between January 2018 and March 2018. You should apply the latest operating system patches to your Change Guardian systems to address these vulnerabilities.

The operating system patches should be downloaded from your OS vendor if you have a traditional installation of Change Guardian. If you have one or more Change Guardian appliances, you should apply the latest updates from the NCC appliance update channel or contact Customer Support for assistance if your appliance doesn’t have direct connectivity to the NCC channel. The NCC channel updates are available as of April, 1st 2018.

For more information about how SUSE has addressed this, a detailed timeline, and steps to verify that your system is protected, see 

For similar information from Red Hat, see 

Note: With the latest OS patches, the previously published recommendation to manually remove the file microcode_ctl-1.17- does not apply.


Additional Information