We found the following security vulnerability on our UIM Servers. This is not related to UIM, but we want to know if it will be safe to mitigate the vulnerabilities as per the suggestions given without impacting UIM.
###### | Windows Speculative Execution Configuration Check | Medium | x.x.x.x | TCP | 445 | Plugin Output: Current Settings: - SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\ FeatureSettingsOverrideMask: Not Set - SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\ FeatureSettingsOverride: Not Set ----------------------------------- Recommended Settings 1: - SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\ FeatureSettingsOverrideMask: 0x00000003 (3) - SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\ FeatureSettingsOverride: 0x00000048 (72) CVEs Covered: CVE-2017-5715, CVE-2017-5753, CVE-2017-5754, CVE-2018-3615, CVE-2018-3620, CVE-2018-3639, CVE-2018-3646, CVE-2018-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11135 Note: Hyper-Threading enabled. ----------------------------------- Recommended Settings 2: - SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\ FeatureSettingsOverrideMask: 0x00000003 (3) - SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\ FeatureSettingsOverride: 0x00002048 (8264) CVEs Covered: CVE-2017-5715, CVE-2017-5753, CVE-2017-5754, CVE-2018-3615, CVE-2018-3620, CVE-2018-3639, CVE-2018-3646, CVE-2018-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11135 Note: Hyper-Threading disabled. |
The remote host has not properly mitigated a series of speculative execution vulnerabilities. | Jan 14, 2022 20:27:39 UTC | Feb 6, 2022 20:35:13 UTC | The remote host has not properly mitigated a series of known speculative execution vulnerabilities. It, therefore, may be affected by : - Branch Target Injection (BTI) (CVE-2017-5715) - Bounds Check Bypass (BCB) (CVE-2017-5753) - Rogue Data Cache Load (RDCL) (CVE-2017-5754) - Rogue System Register Read (RSRE) (CVE-2018-3640) - Speculative Store Bypass (SSB) (CVE-2018-3639) - L1 Terminal Fault (L1TF) (CVE-2018-3615, CVE-2018-3620, CVE-2018-3646) - Microarchitectural Data Sampling Uncacheable Memory (MDSUM) (CVE-2019-11091) - Microarchitectural Store Buffer Data Sampling (MSBDS) (CVE-2018-12126) - Microarchitectural Load Port Data Sampling (MLPDS) (CVE-2018-12127) - Microarchitectural Fill Buffer Data Sampling (MFBDS) (CVE-2018-12130) - TSX Asynchronous Abort (TAA) (CVE-2019-11135) |
Apply vendor recommended settings. | http://www.nessus.org/u?8902cebb http://www.nessus.org/u?6a005ed4 |
Release : 20.4
There is no impact to UIM. Feel free to apply the mitigations.