Home article search

Best practices against the Spectre and Meltdown vulnerabilities


The Spectre and Meltdown vulnerabilities, published on January 3, 2018, are byproducts of optimization techniques designed to increase the performance of modern processors. Fixes to prevent user-mode programs from exploiting these vulnerabilities within the computer's processor are being introduced by operating system vendors. Follow the best practices in this article to secure your computers and data.


Best practices

Your ESET product protects against potential malware infection, but you should also follow the steps in Meltdown & Spectre: How to protect yourself from these CPU security flaws to secure your computers and data. You should also download the latest product modules for your ESET product.


Download the latest product modules for best protection 

ESET has released an updated Antivirus and antispyware scanner (module 1533.3 in update 16680) for all consumer and business products. See the appropriate Knowledgebase article link for instructions to update your product:

Note that a potential side-effect of the Microsoft patch can be reduced system speed. This is not due to the performance of your ESET product, but rather the firmware changes required to mitigate the Meltdown vulnerability within the computer's processor. 



As of January 9th, 2018, Microsoft, Linux and Apple have released patches in response to these issues. ESET products are some of the first to offer full compatibility with Microsoft emergency patches that help protect against these issues. 

We strongly encourage you to download the latest ESET product updates to allow the installation of these patches.

Keeping your ESET product updated is the best way to stay safe from threats that may take advantage of Spectre or Meltdown vulnerabilities. More information about these vulnerabilities is available in the following ESET publications:

Frequently asked Questions about Spectre and Meltdown



Is ESET compatible with the Microsoft patch that corrects the Meltdown Intel Flaw?

Yes, ESET released “Antivirus and Antispyware Module 1533.3” on Wednesday, January 3rd at about 11PM Pacific Time.

Which operating systems are affected by Meltdown?

Any computer using Intel processors made between 1995 and current day are potentially affected. 

Which operating systems have been patched to address the Meltdown exploit?

At this time, Apple, Linux and Microsoft have released patches. Microsoft released a Windows 10 patch available for download on January 3rd, 2018. Apple macOS, OS X iOS as well as  Windows 7 and 8 patches were made available on Tuesday, January 9th, 2018. 

ESET products have already been made compatible with these patches through regular product module updates. You should also be aware of patches for the Firefox, Internet Explorer and Edge web browsers that are currently available through automatic updates from their respective manufacturers. Per latest information at the time of writing, a patch for Google Chrome will be released on January 23rd. Also, you should keep a watch on your computer manufacturer’s site for any firmware updates to address the Meltdown exploit.



Which operating systems are affected by Spectre?
Any computer using an Intel, AMD, or ARM processor is potentially affected.

How do I protect myself from Spectre?
Follow your computer/phone manufacturer for updated firmware releases.


macOS 10.13.2 and earlier

Following the installation of Apple patches for the Spectre/Meltdown vulnerabilites in the macOS versions 10.11.6 and 10.12.6 supplemental update, system errors can occur when ESET Cyber Security aor Cyber Security Pro are opened.

Click for instructions to assure compatibility of your ESET Cyber Security product and macOS
To assure compatibility of your ESET Cyber Security product and macOS, we recommend that you do not update your macOS with the latest security update 10.11.6 or 10.12.6 before you update your ESET Cyber Security product. To check if you have received the latest update for this issue, verify that the "Rootkit protection module" is version 1019 or later: How to find installed components in ESET Cyber Security products.

If you have already installed the latest macOS update, your computer might encounter an error and will restart every time your ESET Cyber Security product starts. To fix this issue:

  1. Start macOS in Safe Boot Mode (hold Shift during startup).
  2. Open Terminal.
  3. Execute the following command in Terminal:
    sudo rm -rf "/Library/Application Support/ESET/esets/modules/em040_32.dat"
  4. Reboot your computer.


Was this information helpful?