Image Courtesy: PCWorld.com

Microsoft recently released updates to fix the Meltdown and Spectre security vulnerabilities in chipsets from Intel, AMD and ARM. Cumulative updates for Windows 10, Windows 8.1 and Windows 7 are available with a fix for the critical security flaw. To protect your Windows PC against Meltdown and Spectre vulnerabilities, Microsoft recommends users to patch the systems by simply installing the latest software update.

“We’re aware of this industry-wide issue and have been working closely with chip manufacturers to develop and test mitigations to protect our customers. We are in the process of deploying mitigations to cloud services and have also released security updates to protect Windows customers against vulnerabilities affecting supported hardware chips from Intel, ARM, and AMD. We have not received any information to indicate that these vulnerabilities had been used to attack our customers,” Microsoft said in a statement.

Windows 10 users can navigate to Settings -> Windows Update to install the fix for the vulnerabilities. On the other hand, Windows 8.1 and 7 users need to patch their systems manually since no OTA update is being offered.

Patch Meltdown and Spectre vulnerabilities on Windows

As we noted above, users are required to install the latest cumulative update in order to patch the security bug. Below you can find the links to download the cumulative updates.

It’s worth noting that the users are recommended to install the latest cumulative as soon as possible since the devices could be compromised and you can’t tell if someone has hijacked your system.

The patch might fail to install on some Windows PCs due to an issue with some versions of Anti-Virus software. Make sure that your antivirus software is up-to-date and compatible with the update. You can, however, set the registry manually to fix compatibility issues with Antivirus software.

  • Key=”HKEY_LOCAL_MACHINE”Subkey=”SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat”
  • Value Name=”cadca5fe-87d3-4b96-b7fb-a231484277cc”
  • Type=”REG_DWORD”
  • Data=”0x00000000”

“During our testing process, we uncovered that some third-party applications have been making unsupported calls into Windows kernel memory that cause stop errors to occur,” Microsoft said in a statement.

If Windows Update reports error 0x80070643 while installing the patch, Microsoft recommends users to verify the installation by navigating to Settings -> System -> About and confirm that Windows 10 has been updated to latest version. This is a known issue where Windows Update incorrectly reports that the update failed to install.

  • jkarna

    There is no patch available for Windows Insiders irrespective of ring type! Why is this not mentioned in the article?

    • Mayank Parmar

      The latest Insider build 17063 comes with fix for these vulnerabilities.

    • M Rankin

      if your in the fast ring it was patched in advance

  • Vencer Emos

    So the title states that it will explain how 8.1 is being patched but no explanation about that in the article :(

    • Mayank Parmar

      Welp, sorry. I’ve updated the article with correct link to 8.1 patch, please check.