Windows 10: Microsoft publishes mitigation instructions for Downfall vulnerability in Windows

Discus and support Microsoft publishes mitigation instructions for Downfall vulnerability in Windows in Windows 10 News to solve the problem; Microsoft published a support article about the recently disclosed CVE-2022-40982 vulnerability, commonly referred to as Downfall, that affects Windows... Discussion in 'Windows 10 News' started by GHacks, Aug 28, 2023.

  1. GHacks
    GHacks New Member

    Microsoft publishes mitigation instructions for Downfall vulnerability in Windows


    Microsoft published a support article about the recently disclosed CVE-2022-40982 vulnerability, commonly referred to as Downfall, that affects Windows devices.

    The vulnerability was disclosed earlier this month. It affects several Intel processor versions and all supported versions of Windows 10, Windows 11 and Windows Server versions 2019 and 2022.

    Microsoft provides guidance about the security issue in the support document KB5029778. There, the company explains how system administrators may install protections against potential exploits and how to disable the protections.

    Successful exploitation of the vulnerability could "be used to infer data from affected CPUs across security boundaries such as user-kernel, processes, virtual machines (VMs), and trusted execution environments".

    Administrators need to install the Intel Platform Update 23.3 microcode update to mitigate the vulnerability. The update is usually supplied by the original equipment manufacturer and Microsoft recommends to contact the manufacturer for information on obtaining and installing the update. A list of companies and links to driver and software download websites are available on the Intel website.

    Intel's latest products are not affected by the vulnerability, including Alder Lake, Raptor Lake and Sapphire Rapids.

    Microsoft publishes mitigation instructions for Downfall vulnerability in Windows downfall-mitigation.png

    The mitigation is enabled by default on systems on which the update is installed. While disabling the mitigation is not recommended in most cases, it is a possibility. Microsoft explains that the mitigation can be disabled if the vulnerability is not part of the threat model. Previous mitigations could impact the performance of the system. While it is too early to tell if the new protection will also impact performance, it is a possibility.

    Disabling is only an option if the following Windows updates have been installed:

    • Windows 10 and Windows 11: if the August 22, 2023 updates or newer updates have been installed.
    • Windows Server: if the September 12, 2023 updates or newer updates have been installed.

    Windows administrators may run the following command from an elevated command prompt window to disable the mitigation on Windows client and server devices:


    reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 33554432 /f

    Administrators who prefer to set the appropriate flag manually may do so as well.

    1. Open the Registry Editor on the Windows machine, e.g., by opening Start, typing regedit and select Registry Editor.
    2. Confirm the UAC prompt that is displayed.
    3. Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management. If a key does not exist, right-click on the previous key, select New > Key, and name it accordingly to create the path.
    4. Right-click on Memory Management and select New > Dword (32-bit) Value.
    5. Name the Dword FeatureSettingsOverride.
    6. Double-click on the newly created Dword and set its value to 2000000 as Hex.
    7. Restart the system.

    The mitigation is disabled and the system is no longer protected against attacks targeting the vulnerability. This disabling can be undone at any time by deleting the Dword in the Registry.

    Thank you for being a Ghacks reader. The post Microsoft publishes mitigation instructions for Downfall vulnerability in Windows appeared first on gHacks Technology News.

    read more...
     
    GHacks, Aug 28, 2023
    #1
  2. t0yz Win User

    Mitigating the last "L1 terminal fault" vulnerabilities - possible or not?

    I've read that, thanks.

    If what you saying is true, this is a departure from how previous vulnerabilities were described, and just adds confusion. The previous way of doing it made far more sense, you could see if the necessary hardware (microcode) was there and if the mitigation
    is enabled&working.

    With this formulation, it suggests that the hardware is vulnerable, and that's it. Yes you applied the mitigations, but... hardware is still found to be vulnerable.

    The whole reason we apply these mitigations is to patch the vulnerable hardware and achieve a non-vulnerable state. You don't want to see that you're still vulnerable with all mitigations in place.
     
  3. Mitigating the last "L1 terminal fault" vulnerabilities - possible or not?

    Hi,

    The post here may help explain how to interpret what "hardware is vulnerable to L1 terminal fault" means: KB4074629: Understanding SpeculationControl PowerShell script output - Microsoft Support

    In short, this line will always report as True if the hardware is believed to be vulnerable to L1 terminal fault, even if the mitigation is enabled. The important part is the line that refers to "L1 terminal fault mitigation is enabled", which in your screenshot
    reports as True. This indicates that the mitigation is enabled and that this device is protected from CVE-2018-3620.

    Hope that helps,

    Matt Miller

    Microsoft Security Response Center
     
    mamill MSFT, Aug 28, 2023
    #3
  4. Brink Win User

    Microsoft publishes mitigation instructions for Downfall vulnerability in Windows

    CVE-2018-8245 Microsoft Publisher Remote Code Execution Vulnerability


    Source: https://portal.msrc.microsoft.com/en.../CVE-2018-8245
     
    Brink, Aug 28, 2023
    #4
Thema:

Microsoft publishes mitigation instructions for Downfall vulnerability in Windows

Loading...
  1. Microsoft publishes mitigation instructions for Downfall vulnerability in Windows - Similar Threads - Microsoft publishes mitigation

  2. Microsoft publishes new Registry mitigation for Intel processors (Spectre)

    in Windows 10 News
    Microsoft publishes new Registry mitigation for Intel processors (Spectre): About six years ago, vulnerabilities were discovered that affected most Intel and AMD processors. The vulnerabilities, Spectre and Meltdown, can be exploited to read sensitive data from attacked computer systems. Intel released an update for one of the Spectre variants,...
  3. finger.exe Vulnerability affecting all Windows Operating Systems, potential mitigation?

    in AntiVirus, Firewalls and System Security
    finger.exe Vulnerability affecting all Windows Operating Systems, potential mitigation?: Dear Microsoft Community, I would be interested to hear your response to possible mitigation against the use of finger.exe to download malicious code as described in the following:...
  4. 0Patch publishes micropatch to address Windows Font Parsing vulnerability

    in Windows 10 News
    0Patch publishes micropatch to address Windows Font Parsing vulnerability: Microsoft published an advisory about a new font parsing vulnerability in Windows on March 23, 2020. The company rated the vulnerability as critical and said that it was aware of limited targeted attacks exploiting the vulnerability. Microsoft listed several workarounds to...
  5. CVE-2020-0601 Windows CryptoAPI Spoofing Vulnerability Security Vulnerability Published:...

    in Windows 10 Installation and Upgrade
    CVE-2020-0601 Windows CryptoAPI Spoofing Vulnerability Security Vulnerability Published:...: Having Windows 10 for some time now, I'm sure along with others, Microsoft continues seemingly monthly, at minimum to post update WARNINGS. WHY is such a company continually putting out updates for their customers with Windows 10 when they themselves don't take the proper...
  6. About emulating SCSI and Vulnerabilities mitigation fixes

    in Windows 10 Performance & Maintenance
    About emulating SCSI and Vulnerabilities mitigation fixes: I've been trying to emulate SCSI on Win10 1903 and it seems that Windows now blocks that type of thing. After a lot of researching I found a workaround to make this possible: Code: [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management]...
  7. Guidance to mitigate unconstrained delegation vulnerabilities

    in Windows 10 News
    Guidance to mitigate unconstrained delegation vulnerabilities: Executive Summary Active Directory Forest trusts provide a secure way for resources in a forest to trust identities from another forest. This trust is directional; a trusted forest can authenticate its users to the trusting forest without allowing the reverse.  A...
  8. Mitigating the last "L1 terminal fault" vulnerabilities - possible or not?

    in AntiVirus, Firewalls and System Security
    Mitigating the last "L1 terminal fault" vulnerabilities - possible or not?: Hello, So I have a 8700K and MSI Z370 with the last BIOS (and also the last, and necessary microcode update - see picture). I have installed the OS patch (Windows 10 x64). Yet the PC is still vulnerable, I can't figure why. This is from the perspective of a normal...
  9. CVE-2018-8245 Microsoft Publisher Remote Code Execution Vulnerability

    in Windows 10 News
    CVE-2018-8245 Microsoft Publisher Remote Code Execution Vulnerability: A remote code execution vulnerability exists when Microsoft Publisher fails to utilize features that lock down the Local Machine zone when instantiating OLE objects. An attacker who successfully exploited the vulnerability could force arbitrary code to be executed in the...
  10. Mitigating speculative execution side channel hardware vulnerabilities

    in Windows 10 News
    Mitigating speculative execution side channel hardware vulnerabilities: On January 3rd, 2018, Microsoft released an advisory and security updates related to a newly discovered class of hardware vulnerabilities involving speculative execution side channels (known as Spectre and Meltdown) that affect AMD, ARM, and Intel CPUs to varying degrees. If...