Posted on 05-14-2019 10:47 PM
I put together a quick article on the latest Speculative Execution and Microarchitectural Data Sampling (MDS) vulnerabilities aka ZombieLoad. I included both articles that Apple released today on the subject.
I will show you what you need to do if you want to enable full mitigation (disabling Hyper-Threading). Bad news is this can not be done via MDM, only through the recovery partition.
https://mrmacintosh.com/zombieload-new-intel-chip-vulnerability
Posted on 05-15-2019 02:00 AM
Thanks for sharing this detailed instruction.
I hope there will be a way to automate this in the future :(
Posted on 05-15-2019 08:49 AM
Jason Broccardo put this great summary together!
https://mrmacintosh.com/mds-vulnerabilities-summary-for-macadmins-by-jason-broccardo/
Posted on 06-17-2019 07:31 AM
Just a bit curious here....looks like certain Intel chips did not have HT, does anyone know how to report this in the JSS? Extension Attribute? This will greatly help with the mitigation process. Thanks!