Update: VIPRE AV: Notice of Vulnerability CVE-2017-5733, CVE-2017-5715 (Spectre) and CVE-2017-5754 (Meltdown)

MAV VIPRE has released a fix for Vulnerability CVE-2017-5733, CVE-2017-5715 (Spectre) and CVE-2017-5754 (Meltdown) for our RMM MAV-VIPRE and CONTROLnow users.  A reboot is required…

This update is now live and can be applied by ensuring your definition files are up to date.  This fix is released in definition version 63792.  You can see the definition version of your agents by looking in the More information column of the “Antivirus Update Check – Managed Antivirus”.  You can also run the Managed Antivirus Protection Report to see the definition version across your clients.

Once your VIPRE clients are at definition version 63792 or higher, you will need to schedule a reboot in order for the registry key to be applied.  Once the machine has rebooted, it should now be ready for the Windows Update.

Screen Shot 2018-01-10 at 3.22.05 PM

NOTE TO OUR MAV Bitdefender users:  We are currently testing our Bitdefender update and plan to start releasing this tomorrow evening, barring any issues found.  The Bitdefender update will not require a reboot to apply the registry key fix as long as all local MAV services are running.

This entry was posted in MSP Remote Monitoring & Management release notes. Bookmark the permalink.