IMHO this is a Geek tool for fun. Got Intel? You’re vulnerable.
See: Windows Client Guidance for IT Pros to protect against speculative execution side-channel vulnerabilities
Download SpeculationControl (click on Show under File List)
Open PowerShell as Admin
Type: Save-Module -Name SpeculationControl -Path path
You’ll get an output like “PowerShellGet requires NuGet provider….”
Enter Y for yes
Type: Save-Module -Name SpeculationControl -Path path
Type: Install-Module -Name SpeculationControl
You’ll get an output like “Untrusted repository. You are installing the modules from an untrusted repository…”
Enter Y for yes
Type: Install-Module -Name SpeculationControl
Type: Set-ExecutionPolicy RemoteSigned
You’ll get output like “Execution Policy Change. The execution policy helps protect you from scripts that you do not trust…”
Enter Y for yes
Type: Import-Module SpeculationControl
Type: Get-SpeculationControlSettings
—Code from my computer—
Windows PowerShell
Copyright (C) Microsoft Corporation. All rights reserved.
PS C:\Windows\system32> Save-Module -Name SpeculationControl -Path G:\Downloads
NuGet provider is required to continue
PowerShellGet requires NuGet provider version '2.8.5.201' or newer to interact with NuGet-based repositories. The NuGet
provider must be available in 'C:\Program Files\PackageManagement\ProviderAssemblies' or
'C:\Users\Eric\AppData\Local\PackageManagement\ProviderAssemblies'. You can also install the NuGet provider by running
'Install-PackageProvider -Name NuGet -MinimumVersion 2.8.5.201 -Force'. Do you want PowerShellGet to install and import
the NuGet provider now?
[Y] Yes [N] No [S] Suspend [?] Help (default is "Y"): y
PS C:\Windows\system32> Save-Module -Name SpeculationControl -Path G:\Downloads
PS C:\Windows\system32> Install-Module -Name SpeculationControl
Untrusted repository
You are installing the modules from an untrusted repository. If you trust this repository, change its
InstallationPolicy value by running the Set-PSRepository cmdlet. Are you sure you want to install the modules from
'PSGallery'?
[Y] Yes [A] Yes to All [N] No [L] No to All [S] Suspend [?] Help (default is "N"): y
PS C:\Windows\system32> Install-Module -Name SpeculationControl
PS C:\Windows\system32> Get-SpeculationControlSettings
Get-SpeculationControlSettings : The 'Get-SpeculationControlSettings' command was found in the module
'SpeculationControl', but the module could not be loaded. For more information, run 'Import-Module SpeculationControl'.
At line:1 char:1
+ Get-SpeculationControlSettings
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : ObjectNotFound: (Get-SpeculationControlSettings:String) [], CommandNotFoundException
+ FullyQualifiedErrorId : CouldNotAutoloadMatchingModule
PS C:\Windows\system32> Set-ExecutionPolicy RemoteSigned
Execution Policy Change
The execution policy helps protect you from scripts that you do not trust. Changing the execution policy might expose
you to the security risks described in the about_Execution_Policies help topic at
https:/go.microsoft.com/fwlink/?LinkID=135170. Do you want to change the execution policy?
[Y] Yes [A] Yes to All [N] No [L] No to All [S] Suspend [?] Help (default is "N"): y
PS C:\Windows\system32> Import-Module SpeculationControl
PS C:\Windows\system32> Get-SpeculationControlSettings
Speculation control settings for CVE-2017-5715 [branch target injection]
Hardware support for branch target injection mitigation is present: False
Windows OS support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is enabled: False
Windows OS support for branch target injection mitigation is disabled by system policy: False
Windows OS support for branch target injection mitigation is disabled by absence of hardware support: True
Speculation control settings for CVE-2017-5754 [rogue data cache load]
Hardware requires kernel VA shadowing: True
Windows OS support for kernel VA shadow is present: True
Windows OS support for kernel VA shadow is enabled: True
Windows OS support for PCID optimization is enabled: True
Suggested actions
* Install BIOS/firmware update provided by your device OEM that enables hardware support for the branch target injection mitigation.
* Follow the guidance for enabling Windows support for speculation control mitigations are described in https://support.microsoft.com/help/4072698
BTIHardwarePresent : False
BTIWindowsSupportPresent : True
BTIWindowsSupportEnabled : False
BTIDisabledBySystemPolicy : False
BTIDisabledByNoHardwareSupport : True
KVAShadowRequired : True
KVAShadowWindowsSupportPresent : True
KVAShadowWindowsSupportEnabled : True
KVAShadowPcidEnabled : True
-End-