Is there an after one seems to wonder? Although the major hardware vendors have shipped fixes or new chips closing these vulnerabilities, new findings seem to appear every so often. One also wonders how the hardware vendors closed these vulnerabilities as some cases required a major architectural change, which could only be accomplished with new hardware, not a software fix…
The question remains for users/customers what to do after they successfully implemented either one of both: software fix and/or new hardware. Did you really exchange one chip with another or buy new hardware???
I would definitely recommend to change passwords as this seems to have been the major use case of the exploit, catching passwords especially those of super and administrative users.