New Intel Chip Vulnerability (ZombieLoad) Speculative Execution and Microarchitectural Data Sampling (MDS) vulnerabilities. How to enable full Mac mitigation.

ClassicII
Contributor III

I put together a quick article on the latest Speculative Execution and Microarchitectural Data Sampling (MDS) vulnerabilities aka ZombieLoad. I included both articles that Apple released today on the subject.

I will show you what you need to do if you want to enable full mitigation (disabling Hyper-Threading). Bad news is this can not be done via MDM, only through the recovery partition.

https://mrmacintosh.com/zombieload-new-intel-chip-vulnerability

3 REPLIES 3

j_stroomberg
New Contributor

Thanks for sharing this detailed instruction.

I hope there will be a way to automate this in the future :(

ClassicII
Contributor III

Not applicable

Just a bit curious here....looks like certain Intel chips did not have HT, does anyone know how to report this in the JSS? Extension Attribute? This will greatly help with the mitigation process. Thanks!