Windows 10: Windows Client Guidance against speculative execution vulnerabilities

Discus and support Windows Client Guidance against speculative execution vulnerabilities in Windows 10 News to solve the problem; This is the result I got after running all three command lines from PowerShell (Admin) Verification as per Shawn's tutorial (first page): [img]... Discussion in 'Windows 10 News' started by Brink, Jan 4, 2018.

  1. Windows Client Guidance against speculative execution vulnerabilities


    This is the result I got after running all three command lines from PowerShell (Admin) Verification as per Shawn's tutorial (first page):


    Windows Client Guidance against speculative execution vulnerabilities [​IMG]


    At one point after the second command line, I was asked if I wanted PowershellGet to install and import the NuGet provider now. I put Yes ("y"). After the third command line, I got the results seen at the bottom of the screenshot with three "false" lines and all the rest is labelled as "True". My confusion is about "Suggested actions" highlighted in the red square with a yellow arrow:

    [Install BIOS/firmware update provided by your device OEM that enables hardware support for the branch target injection mitigation.]

    My PC is about two years old. I am on UEFI and in the suggestion they are talking about BIOS/Firmware. Does that mean they are using the terms Bios & UEFI interchangeably?. And how do I get that update from Intel. Can anyone chime in and show me the light at the end of the tunnel?
     
    IronZorg89, Jan 5, 2018
    #46
  2. fdegrove Win User

    Hi,

    UEFI is still a BIOS although an advanced one so, yes they use it interchangeably. Updates will crop up to "secure" OS and CPU's from either your OEM, Intel, AMD or Microsoft (for the OS part and possibly micro code for the cpu).

    It's still early days as they're all still waking up from the season holidays and such. I'd keep an eye on my MB OEM if it were me and check for BIOS/UEFI updates on a regular basis.
    Currently available micro code updates from Intel aren't fixing anything yet and I very much doubt that those updates could cover both Meltdown and Spectre vulnerabilities fully.

    Cheeers, *Wink
     
    fdegrove, Jan 5, 2018
    #47
  3. Thanks a lot for your intervention. Really appreciate it. According to what you are saying, the best approach for now is to wait & see while checking for any updates regarding my MB OEM. If I understood correctly "Spectre" is only concerned with Intel processors and "Meltdown" with all the other processors as far as these speculative execution side-channel attacks may affect one's PC.

    In the meantime, I found a link for Intel Detection Tool:

    *Arrow Download Intel-SA-00086 Detection Tool

    I am going to give it a try and see what gives.

    Thanks again *Smile
     
    IronZorg89, Jan 5, 2018
    #48
  4. Tony K Win User

    Windows Client Guidance against speculative execution vulnerabilities

    Well, if this don't beat all. This is the kind of thing where I'd like to take all 3 machines, throw them in the garbage, and look for another hobby. The smart phone too. Get a cheapo dumb phone. If this can't get fixed I just may do that. *sarc Off to see if I can find a BIOS update I guess....

    Oh and thanks for the article/tutorial, Shawn.



    Windows Client Guidance against speculative execution vulnerabilities [​IMG]
     
    Tony K, Jan 5, 2018
    #49
  5. Superfly Win User
    Hmmm.. that one does need some updating...seems all it has is the Win update fix.... firmware is non-compliant..
     
    Superfly, Jan 5, 2018
    #50
  6. khanmein Win User
    Windows Client Guidance against speculative execution vulnerabilities [​IMG]
     
    khanmein, Jan 5, 2018
    #51
  7. Tony K Win User
    That was on my FCU partition. Below is my IP 17063 partition, which, of course, is the same BIOS, but they say we Insiders are running the latest security fixes? What a crock!

    Absolutely nothing on the Asus site about this issue. Not in support or news. Zilch. I have this sinking feeling I won't be able to update this tower, nor my laptop BIOS. Probably at least half of us here will own boat anchors soon unless we get updates. If not, then these bass turd corporations will turn around and sell us more junk. Money sucking educated idiots, every one of them. *sarc

    Gates had better step in on this issue to do something about it.



    Windows Client Guidance against speculative execution vulnerabilities [​IMG]
     
    Tony K, Jan 5, 2018
    #52
  8. Superfly Win User

    Windows Client Guidance against speculative execution vulnerabilities

    My posts are getting deleted at a rapid rate...so read quickly...

    But totally agree... what goes around comes around...

    ...my last post here.
     
    Superfly, Jan 5, 2018
    #53
  9. Joanne Win User
    @Brink, can you please add the PowerShell command to restore things the way they were, before all this?

    Is this the appropriate command?

    Set-ExecutionPolicy Restricted -Scope Process -Force


    Thank you.
     
    Joanne, Jan 5, 2018
    #54
  10. Cliff S New Member
    [/quote] Using the Set-ExecutionPolicy Cmdlet
     
    Cliff S, Jan 5, 2018
    #55
  11. Joanne Win User
    Eh... Okay, thank you... but... no time + not quite in the mood right now to try this new thing I meet, first time in my life, so... which command exactly returns the system the way it was before all this? And does the "-Scope Process -Force" part of the initial commands play any role?

    Like, IF I will give "Set-ExecutionPolicy RemoteSigned" will it get applied OR will PowerShell complain due to the Scope Process Force?

    @Brink, hello, please?
     
    Joanne, Jan 5, 2018
    #56
  12. VBF
    VBF Win User
    This PowerShell and the execution policies explained | JeffOps appears to explain the
    -Scope” parameter and to my mind if we use the Process switch it will only alter the current process, so closing Powershell will cancel any changes.
    I too would like confirmation of that.....

    EDIT:
    If you run all 3 steps in the OP of this thread, THEN close and Reopen Powershell, THEN ONLY run
    Get-SpeculationControlSettings
    WITHOUT running the previous 2 steps, it fails to run.
    Run all 3 steps again and it works as illustrated so it looks like it does just affect the current process as i said above.

    Actually, reading the first post it does say "Temporarily set PowerShell script execution policy"
    And if you type Get-ExecutionPolicy when you first open Powershell it's Restricted
    Run the first command "Set-ExecutionPolicy Unrestricted -Scope Process -Force" it goes to Unrestricted
    Close and reopen Powershell and it's Restricted again
     
  13. Joanne Win User

    Windows Client Guidance against speculative execution vulnerabilities

    Okay, thank you, now I understand it is temporarily. It is OK now.



    Windows Client Guidance against speculative execution vulnerabilities [​IMG]
     
    Joanne, Jan 5, 2018
    #58
  14. Mooly Win User
    My understanding so far in all this is that the Windows Updates are only a tiny part of the puzzle and its solution, and that it will be future firmware updates that complete the fix... and I also assume that is the point we will see any performance impacts.

    Is that a correct assumption ?

    I looked at Dell and see they now have a dedicated page to this:

    Microprocessor Side-Channel Attacks (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754): Impact on Dell products | Dell US


    I also see that as yet my Vostro 3750 doesn't make the list (maybe considered to old at 6 yrs).

    Also, if a firmware update is the last piece of the puzzle then is it also correct to say that such an update can only be applied manually via a user searching the details out, or a user running a PC that is linked to and automatically supported by a manufacturer ?

    I see that as a major issue where things can and will go wrong for some.
     
    Mooly, Jan 5, 2018
    #59
  15. Cr00zng Win User
    Seemingly, there will be lot of system that will not receive BIOS/EUFI updates. Most hardware, including the CPU, have a three years warranty. And of course, it is a limited warranty...

    The chances are that hardware, where the warranty period expired, the updates will be scarce. OEMs, manufacturers, etc., would love to see you purchase a new system in this stagnating computer market. Even if purchasing a new system will not result in much of a performance increase over the existing one. Especially, if the new system does not have SSD drive and the old one with Sandy or Ivy Bridge CPU does....


    Windows Client Guidance against speculative execution vulnerabilities [​IMG]


    That's on my W10 system that's EOL-ed; yes there is a better acronym for that...*Zip
     
    Cr00zng, Jan 5, 2018
    #60
Thema:

Windows Client Guidance against speculative execution vulnerabilities

Loading...
  1. Windows Client Guidance against speculative execution vulnerabilities - Similar Threads - Client Guidance against

  2. Microsoft CVE-2017-5715: Guidance to mitigate speculative execution side-channel...

    in AntiVirus, Firewalls and System Security
    Microsoft CVE-2017-5715: Guidance to mitigate speculative execution side-channel...: Microsoft CVE-2017-5715: Guidance to mitigate speculative execution side-channel vulnerabilitiesMicrosoft CVE-2017-5753: Guidance to mitigate speculative execution side-channel vulnerabilitiesMicrosoft CVE-2017-5754: Guidance to mitigate speculative execution side-channel...
  3. Manage Speculative Execution Settings Script for Windows

    in Windows 10 News
    Manage Speculative Execution Settings Script for Windows: Manage Speculative Execution Settings Script is a batch file for Microsoft Windows devices to check and manage the Speculative Execution Protection status on the system. Speculative Execution side-channel attacks are a new class of vulnerabilities that started to make waves...
  4. Windows client guidance for IT Pros to protect against speculative

    in Windows 10 News
    Windows client guidance for IT Pros to protect against speculative: Windows client guidance for IT Pros to protect against speculative execution side-channel vulnerabilities Applies to: Windows Server 2016 Version 1709, Windows Server 2012 R2 Standard, Windows Server 2012 Standard, Windows Server 2008 R2 Service Pack 1, Windows Server 2008...
  5. Guidance to mitigate unconstrained delegation vulnerabilities

    in Windows 10 News
    Guidance to mitigate unconstrained delegation vulnerabilities: Executive Summary Active Directory Forest trusts provide a secure way for resources in a forest to trust identities from another forest. This trust is directional; a trusted forest can authenticate its users to the trusting forest without allowing the reverse.  A...
  6. Surface Guidance for speculative execution side-channel vulnerability

    in Windows 10 News
    Surface Guidance for speculative execution side-channel vulnerability: Surface Guidance to protect against speculative execution side-channel vulnerabilities Applies to: Surface Pro 4, Surface Book, Surface Studio, Surface Pro (latest), Surface Laptop, Surface Pro with LTE Advanced, Surface Book 2 - 13 inch, Surface Book 2 - 15 inch...
  7. SQL Server Guidance against speculative execution vulnerabilities

    in Windows 10 News
    SQL Server Guidance against speculative execution vulnerabilities: SQL Server Guidance to protect against speculative execution side-channel vulnerabilities Summary Microsoft is aware of a new publicly disclosed class of vulnerabilities referred to as “speculative execution side-channel attacks” that affect many modern processors and...
  8. Mitigating speculative execution side channel hardware vulnerabilities

    in Windows 10 News
    Mitigating speculative execution side channel hardware vulnerabilities: On January 3rd, 2018, Microsoft released an advisory and security updates related to a newly discovered class of hardware vulnerabilities involving speculative execution side channels (known as Spectre and Meltdown) that affect AMD, ARM, and Intel CPUs to varying degrees. If...
  9. Azure Stack Guidance against speculative execution vulnerabilities

    in Windows 10 News
    Azure Stack Guidance against speculative execution vulnerabilities: Azure Stack guidance to protect against the speculative execution side-channel vulnerabilities Summary Microsoft is aware of a new publicly disclosed class of vulnerabilities referred to as “speculative execution side-channel attacks” that affect many modern...
  10. Windows Server Guidance against speculative execution vulnerabilities

    in Windows 10 News
    Windows Server Guidance against speculative execution vulnerabilities: Windows Server guidance to protect against speculative execution side-channel vulnerabilities Summary Microsoft is aware of a new publicly disclosed class of vulnerabilities that are referred to as “speculative execution side-channel attacks” that affect many modern...