Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Notifications
Login / Register
Community
Community
Notifications
close
  • Forums
  • Knowledge Center
  • Events & Webinars
  • Ideas
  • Blogs
Help
Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Login / Register
Sustainability
Sustainability

Join our "Ask Me About" community webinar on May 20th at 9 AM CET and 5 PM CET to explore cybersecurity and monitoring for Data Center and edge IT. Learn about market trends, cutting-edge technologies, and best practices from industry experts.
Register and secure your Critical IT infrastructure

Critical Update - Spectre and Meltdown

Geo SCADA Knowledge Base

Access vast amounts of technical know-how and pro tips from our community of Geo SCADA experts.

cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • Home
  • Schneider Electric Community
  • Knowledge Center
  • Geo SCADA Knowledge Base
  • Critical Update - Spectre and Meltdown
Invite a Co-worker
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send Invite Cancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Send New Invite Close
Top Labels
Top Labels
  • Alphabetical
  • database 32
  • Web Server and Client 31
  • WebX 19
  • Request Form 18
  • Lists, Events & Alarms 16
  • ViewX 15
  • Application Programming 12
  • Setup 12
  • Telemetry 8
  • Events & Alarms 7
  • Lists 7
  • Mimic Graphics 7
  • Downloads 6
  • Support 5
  • IoT 5
  • SCADA 5
  • Geo SCADA Expert 5
  • Drivers and Communications 4
  • Security 4
  • DNP 3 3
  • IEC 61131-3 Logic 3
  • Trends and Historian 2
  • Virtual ViewX 2
  • Geo Scada 1
  • ClearSCADA 1
  • Templates and Instances 1
  • Releases 1
  • Maps and GIS 1
  • Mobile 1
  • Architectures 1
  • Tools & Resources 1
  • Privacy Policy 1
  • OPC-UA 1
  • Previous
  • 1 of 4
  • Next
Latest Blog Posts
  • OPC UA - Driver and Server
  • Requirements for Generating a Valid OPC UA Server Certificate
  • Load Events Using LoadRecord and LoadRecords
  • Geo SCADA Embedded Component Licenses
  • Geo SCADA 2023 Known Issues
Related Products
product field
Schneider Electric
EcoStruxure™ Geo SCADA Expert

Invite a Colleague

Found this content useful? Share it with a Colleague!

Invite a Colleague Invite
Anonymous user
Not applicable
‎2021-06-09 10:36 AM
0 Likes
0
634
  • Bookmark
  • Subscribe
  • Email to a Friend
  • Printer Friendly Page
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

‎2021-06-09 10:36 AM

Critical Update - Spectre and Meltdown

Originally published on Geo SCADA Knowledge Base by Anonymous user | June 09, 2021 07:36 PM

📖 Home  Back  

Critical Update - Spectre and Meltdown



26 February 2018


The testing and verification of Microsoft patches for these vulnerabilities is complete.

We recommend that the February roll-up updates from Microsoft are installed and used with ClearSCADA. Test results for these updates are located here.

Our testing with the available Spectre and Meltdown operating system updates active has shown that there is a measurable impact on performance. Impact on disk I/O was not as noticeable in our testing as was the impact on network access. It is not possible to produce definitive figures, so we recommend that you perform testing on offline/simulation systems before deployment, particularly on large or heavily loaded systems. e.g. where total lock usage is above 40%.

You can see total lock usage by adding the result of the OPC tags "#LOCK.1.% Time In Excl Lock" and "#LOCK.1.% Time In Shared Lock". These OPC tags are figures from 0 to 1. The values of these metrics are also listed in snapshot files as percentages from 0 to 100 (search for '% Time In Excl Lock' and '% Time In Shared Lock' and see the figures in the first line). We recommend comparing figures before and after the updates are applied and activated.

18 January 2018


The testing and verification of Microsoft patches for these vulnerabilities is ongoing. Further updates will be added to this page.

We hope to advise users during January of the potential performance impact of the updates, and whether an update of ClearSCADA software will be required for any reason.

Our current advice is not to apply recent patches from Microsoft, as the impact is not yet completely known.

We are aware of a separate issue related to other changes within the Microsoft monthly roll-up update which relates to Windows 7, .Net 4.7.1, and ClearSCADA 2014 and up. (See here).

8 January 2018


Schneider Electric® has become aware of two side channel attacks that leverage critical vulnerabilities in a wide range of computer CPU. These vulnerabilities have been named Spectre and Meltdown. Spectre tricks other applications into accessing arbitrary locations in their memory. Meltdown breaks the mechanism that keeps applications from accessing arbitrary system memory. There have been no known exploits in the wild. Schneider Electric is actively assessing the impact on our offers.

Details:


Meltdown:

Desktop, Laptop, and Cloud computers may be affected by Meltdown. Every Intel processor which implements out-of-order execution is potentially affected, which is effectively every processor since 1995 (except Intel Itanium and Intel Atom before 2013). Researchers have successfully tested Meltdown on Intel processor generations released as early as 2011. Currently, researchers have only verified Meltdown on Intel processors.

CVE-2017-5754 is the official vulnerability reference to Meltdown.



Spectre:

Desktops, Laptops, Cloud Servers, as well as Smartphones may be affected by Spectre. All modern processors capable of keeping many instructions in flight are potentially vulnerable. Researchers have verified Spectre on Intel, AMD, and ARM processors.

CVE-2017-5753 and CVE-2017-5715 are the official vulnerability references to Spectre.



Recommended Mitigations


Schneider Electric is actively monitoring vendor research into these vulnerabilities to determine appropriate actions to be taken. At the time of this publication, information is being updated rapidly and the impact of proposed mitigations and patches remains unclear. Many of the initial mitigations proposed by hardware and operating system vendors indicate a high level of potential performance impact, Schneider Electric recommends caution if mitigations or patches are applied to critical and/or performance constrained systems. If you elect to apply recommended patches or mitigations in advance of further guidance from Schneider Electric, we strongly recommend evaluating the impact of those measures on a Test & Development environment or an offline infrastructure. Schneider Electric will provide further guidance as information becomes available.

  • Microsoft: Please refer to Microsoft support sites for further information.

  • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002

  • https://support.microsoft.com/en-us/help/4073119/windows-client-guidance-for-it-pros-to-protect-agai...

  • https://support.microsoft.com/en-us/help/4072698/windows-server-guidance-to-protect-against-the-spec...

  • Linux: Kernel page table isolation (KPTI), a hardening technique designed to improve security by isolating the kernel space from user space memory has already been implemented in the Linux kernel. Please visit your respective Linux distribution site for patches.

  • Cloud: Amazon Web Services and Microsoft Azure have applied patches to address mitigations for these attacks.


More Information


  • Meltdown and Spectre Official site: https://meltdownattack.com/

  • Microsoft OS: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002

  • Linux based fix : https://gruss.cc/files/kaiser.pdf

  • KAISER: https://lwn.net/Articles/738975/

  • AMD statement: https://www.amd.com/en/corporate/speculative-execution

  • Reading privileged memory with a side-channel- Google Project Zero Blog post: https://googleprojectzero.blogspot.co.at/2018/01/reading-privileged-memory-with-side.html

  • ARM: https://developer.arm.com/support/security-update

  • Google: https://support.google.com/faqs/answer/7622138




Mailing Subscription:


To stay updated on any security issues of interest, please refer to our Security Notification areas:

  • Schneider Electric CyberSecurity Notifications (All Products):http://www.schneider-electric.com/b2b/en/support/cybersecurity/security-notifications.jsp

  • ClearSCADA Security Notification List:http://resourcecenter.controlmicrosystems.com/display/CS/Stay+Informed%21


Go: Home Back

Author

Biography

Anonymous user

Link copied. Please paste this link to share this article on your social media post.

  • Back to Blog
  • Newer Article
  • Older Article
To The Top!

Forums

  • APC UPS Data Center Backup Solutions
  • EcoStruxure IT
  • EcoStruxure Geo SCADA Expert
  • Metering & Power Quality
  • Schneider Electric Wiser

Knowledge Center

Events & webinars

Ideas

Blogs

Get Started

  • Ask the Community
  • Community Guidelines
  • Community User Guide
  • How-To & Best Practice
  • Experts Leaderboard
  • Contact Support
Brand-Logo
Subscribing is a smart move!
You can subscribe to this board after you log in or create your free account.
Forum-Icon

Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.

Register today for FREE

Register Now

Already have an account? Login

Terms & Conditions Privacy Notice Change your Cookie Settings © 2025 Schneider Electric

This is a heading

With achievable small steps, users progress and continually feel satisfaction in task accomplishment.

Usetiful Onboarding Checklist remembers the progress of every user, allowing them to take bite-sized journeys and continue where they left.

of