Find out if your Windows is affected by Meltdown and Spectre CPU Vulnerabilities

Most of you must have read about the Spectre and Meltdown CPU vulnerabilities and wondering if there is anything you need to do to protect yourself against these CPU vulnerabilities. Microsoft has released a PowerShell cmdlet that lets you find out if your Windows computer is affected by Meltdown and Spectre CPU Vulnerabilities and suggested ways on how to protect your system from it.

Find out if your Windows is affected by Meltdown & Spectre

Run PowerShell as administrator and execute the following commands one after the other:

PS> # Save the current execution policy so it can be reset

PS> $SaveExecutionPolicy = Get-ExecutionPolicy

PS> Set-ExecutionPolicy RemoteSigned -Scope Currentuser

PS> CD C:\ADV180002\SpeculationControl

PS> Import-Module .\SpeculationControl.psd1

PS> Get-SpeculationControlSettings

PS> # Reset the execution policy to the original state

PS> Set-ExecutionPolicy $SaveExecutionPolicy -Scope Currentuser

This will install, activate an additional module and enable protection.

Check the output and see if all the elements show a value of True. That shows that your Windows is protected. If it shows False, it means that your system is vulnerable and you need to fix those issues.

You can later on restore the default ExecutionPolicy setting by running executing this Set-ExecutionPolicy Default command.

For more information, you may visit Microsoft.

Protect Windows against Meltdown & Spectre

Windows is affected by Meltdown & Spectre

US-CERT has said – “Replace CPU hardware. The underlying vulnerability is primarily caused by CPU architecture design choices. Fully removing the vulnerability requires replacing vulnerable CPU hardware.”

However, there are some basic precautions you can take to protect your Windows against Meltdown and Spectre CPU Vulnerabilities:

Ashampoo Spectre Meltdown CPU Checker will check if your Windows computer is vulnerable easily.

Stay safe!

Posted by on , in Category Security with Tags
Anand Khanse is the Admin of, a 10-year Microsoft MVP Awardee in Windows (2006-16) & a Windows Insider MVP. Please read the entire post & the comments first, create a System Restore Point before making any changes to your system & be careful about any 3rd-party offers while installing freeware.

One Comment

  1. Just a heads up, even a fully patched Windows machine without the necessary CPU microcode updates will test positive (False in the present context) on the above test. So just updating Windows is not enough, one needs to be vigilant in finding CPU microcode updates pushed by their PC manufacturers.

Leave a Reply

Your email address will not be published. Required fields are marked *

5 + 8 =