Patch Management Group

 View Only

Using CMS to remediate for Spectre / Meltdown on client PCs 

Jan 11, 2018 08:36 AM

Some helpful links
Microsoft Client Guidance
Microsoft Security Advisory ADV180002
Microsoft Understanding Performance impact of mitigations
Spectre-Meltdown Overview
Symantec Product Update INFO 4786
Symantec Microsoft Software Update release Jan 2018 INFO4782
Meltdown-Spectre powershell reporting tool
Dell BIOS update for clients

Per the Microsoft client guidance link above, the first step to protecting your clients is making sure your antivirus updates.  We use Sophos, and you can see if a client has the necessary registry key by looking at

Key="HKEY_LOCAL_MACHINE"Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat"
Value Name="cadca5fe-87d3-4b96-b7fb-a231484277cc"
Type="REG_DWORD”
Data="0x00000000”

All of the major antivirus companies are going to push that key out, but you have to check with yours.  This key is required in order for your computers to become applicable for the necessary windows security update in the Symantec Patch Remediation Center & future windows rollups and security updates.  The patch is included in the monthly rollups (so MS18-01-MR7 for win7 or MS18-01-W10 for win10).  I didn't test because we always push monthly rollups for win7, but I am confident the updates for this vulnerability are included in the security only update MS18-01-SO7.  These updates are included in PMImport 7.2.118.

The trick for us is how to update BIOS remotely because we use bitlocker to encrypt our hard drives, and you need to suspend bitlocker for BIOS updates to run.  I am testing a workflow that pushes the BIOS update along with an xml file in order to accomplish re-enabling bitlocker.  This is an example of the software resource for the Dell Latitude 5x80 series. The xml file is attached to this article; it just creates a scheduled task on restart bitlocker on startup and then deletes itself.

  

When creating this new software resource, I also create a dummy command line item in order to get the files to the computer without actually executing it.

 

Note: You could just copy the necessary files to your workstations with a file copy job instead of including of creating software resource should you choose.

Below is the script I'm using to suspend bitlocker, update bios, and add the scheduled task to re-enable bitlocker.  You'll need to modify the file path with your GUID which you can find by navigating to your software library and finding the uploaded BIOS file & enter your BIOS password.

REM Suspend Bitlocker
Manage-bde.exe -protectors -disable c:

REM Update Bios
"C:\Program Files\Altiris\Altiris Agent\Agents\SoftwareManagement\Software Delivery\{YOURGUIDHERE}\cache\Latitude_5X80_Precision_3520_1.8.1.exe" /s /p=BIOSPASSWORDHERE /FORCEIT /l=c:\drivers\5480-181.log

schtasks /create /f /tn "Bitlock" /XML "C:\Program Files\Altiris\Altiris Agent\Agents\SoftwareManagement\Software Delivery\{YOURGUIDHERE}\cache\enablebitlockeronstartup.xml"

 

Note: the risk with this method is users going home without restarting with a machine with bitlocker suspended so you may have to address for that with a scheduled restart, and also laptops will only update while plugged into power.   Also, there are expected slow downs with the BIOS updates particularly on older processors, so you may have to weigh that in your environment. 

Clients will need to do hardware inventory updates in order to report back their new BIOS version to CMS.  You likely will want to check your hardware inventory delta schedules and up them during the remediation, or at least scope a new delta update for the models not on the correct BIOS.

You can create a filter/target that checks for Model Like X and Bios version is not latest, see the solution on this post for the query.

Testing is still needed, but you should be able to combine all the tools above to use a quick delivery and/or managed software policy to get the BIOS updated for your clients fully remediating them against Spectre and Meltdown.

Would love to hear tips of how others are planning remediation.

Statistics
0 Favorited
1 Views
1 Files
0 Shares
0 Downloads
Attachment(s)
xml file
enablebitlockeronstartup.xml   1 KB   1 version
Uploaded - Feb 25, 2020

Tags and Keywords

Comments

Jan 18, 2018 02:01 PM

@chrismvevoy72 - no worries, glad it was helpful to someone.  Are you planning on doing the HP updates in person, or can your users suspend because they run as admins?  There's definitely some sneakernet going on here to get BIOS updated, unfortunately.

Jan 18, 2018 12:34 PM

Thanks Sally - this is a really useful article!

We are planning to tackle it in a similar way, although we have mostly HP devices here.  From the brief testing I've done so far the BIOS update for the HP laptops seems to detect if bitlocker is enabled and allows you to suspend it as part of the BIOS update process, so I'm hoping to avoid the need for any bitlocker scheduled tasks for our laptops.

I'm using a separate tool while I'm testing to report back on if the patches have mitigated the risk, but once I go to production I could do with an Altiris report to run that would report back of the software patches are done and if the BIOS update has been done.  Apparently MS have released a powershell module to achieve that in powershell but I've not looked into it yet...

Jan 11, 2018 02:13 PM

Thanks, Joshua. I had missed the attached files on that INFO article.  Cheers.

Jan 11, 2018 01:53 PM

Thank you!

I like to advise on reviewing INFO4782 and note the caveats to how Patch Management Solution targets and what merits Applicable.

There are two custom jobs/reports that help isolate if the required registry checked was updated by the AntiVirus being current and if there are any AMD Clients which need to be excluded from patching.

Related Entries and Links

No Related Resource entered.