Windows 7 Meltdown Patch Discovery Vulnerability Allows Any Process to Read and Write Kernels

In January of this year, Intel confirmed that two security vulnerabilities have been found in its own CPU. These vulnerabilities will expose billions of devices to the risk of being attacked. Two loopholes in 'Meltdown' and 'Spectre' have caused many people to feel panicked because they The discovery of these vulnerabilities has affected almost every type of computing device manufactured in the past 20 years, whether it is a mobile phone or a personal computer. They allow malicious programs to steal sensitive data that is processed on affected machines.

In order to solve this problem, Microsoft immediately launched a security patch, and said that users who have installed the 'Meltdow patch' will not be affected. But don't be too happy. There is a worse thing now:

A security organization discovered that this serious vulnerability exists in 64-bit Windows 7 systems that were patched between January and February 2018. This vulnerability allows arbitrary processes to read and write kernels.

Windows 7 systems that have not been patched or patched in March are unaffected. To know if your Windows 7 system is affected, you can download the PCILeech test from Github.

2016 GoodChinaBrand | ICP: 12011751 | China Exports