Windows 10: Windows Client Guidance against speculative execution vulnerabilities

Discus and support Windows Client Guidance against speculative execution vulnerabilities in Windows 10 News to solve the problem; Hi, Seemingly, there will be lot of system that will not receive BIOS/EUFI updates. A bios/uefi update won't be fixing this vulnerability... Discussion in 'Windows 10 News' started by Brink, Jan 4, 2018.

  1. fdegrove Win User

    Windows Client Guidance against speculative execution vulnerabilities


    Hi,

    A bios/uefi update won't be fixing this vulnerability anyhow. Intel, Google, MS and so on are working on solutions for it.
    There are pretty recent (November 2017) micro code updates available for pretty much any cpu that needs it starting with the now prehistoric Pentiums and upwards.
    It does not resolve this vulnerability yet, just saying that there's hope for people with oldish hard ware.


    Cheers, *Wink
     
    fdegrove, Jan 5, 2018
    #61
  2. f14tomcat Win User

    @Superfly
    He has an AMD cpu, I believe. Does all that still apply?
     
    f14tomcat, Jan 5, 2018
    #62
  3. I wish I was 50 *Wink
     
    Josey Wales, Jan 5, 2018
    #63
  4. Cliff S New Member

    Windows Client Guidance against speculative execution vulnerabilities

    Cliff S, Jan 5, 2018
    #64
  5. fdegrove Win User
    Hi,

    Ironic how AMD calls it "AMD Secure Processor"

    If the PS scripts tells you that the CPU is not secure yet then you can trust that.

    Cheers, *Wink
     
    fdegrove, Jan 5, 2018
    #65
  6. f14tomcat Win User
    f14tomcat, Jan 5, 2018
    #66
  7. Cliff S New Member
    It seems so, they just published the article today.
     
    Cliff S, Jan 5, 2018
    #67
  8. clam1952 Win User

    Windows Client Guidance against speculative execution vulnerabilities

    Makes one wonder just what other flaws are likely to be discovered or if any processor has ever actually been secure or with the rate these "security" experts are discovering flaws, ever will be.
     
    clam1952, Jan 5, 2018
    #68
  9. Cliff S New Member
    Nobody would have known about this(not even the black hats) and it have been fixed eventually and quietly with some updates in the effected OS's and still supported hardware BIOS, and no one would have been the wiser, not even the bad guys.

    But for some dumba** Linux kernel developer that tagged his code with a #comment, and being open source it was quickly seen by someone else and that dumba** told the media*Banghead
     
    Cliff S, Jan 5, 2018
    #69
  10. Steve C Win User
    I suggest no processor is provably secure or error free - discuss.
     
    Steve C, Jan 5, 2018
    #70
  11. tracit99 Win User
    Solved in build 17046 with Powershell command Set-PSRepository psgallery -InstallationPolicy trusted which prompted me to install the latest version of NuGet. Credit to MaxMVP in a Reedit post found here.
     
    tracit99, Jan 5, 2018
    #71
  12. Tony K Win User
    Not a perfect world, but yes, it makes one wonder.

    I agree, but the rat comes out of the hole eventually. It's like picking between the better of two evils. In the end it's better that it was caught before the bad guys found it. Thing is they should've kept it secret long enough to create a total fix first, if at all. None would've been the wiser. Now we have a period of time that the bad guys can exploit it. I may rant and rave that I may have to buy new hardware, but that's what concerns me most every time I boot a machine.

    Like I said, it's not a perfect world, but how long has the chip architecture and processing code been written? Years ago, yes? You'd think out of all the educated in that field that someone would have caught this years ago. SFAIK Murphy's law, a legitimate rule, is taught in most engineering schools. Perhaps not in hardware and/or software engineering?
     
    Tony K, Jan 5, 2018
    #72
  13. Cliff S New Member

    Windows Client Guidance against speculative execution vulnerabilities

    From the Intel White Paper PDF: Intel Analysis of Speculative Execution Side Channels

    https://newsroom.intel.com/wp-conten...e-Channels.pdf
     
    Cliff S, Jan 6, 2018
    #73
  14. CountMike New Member
    What about VMs, can it penetrate that ?
     
    CountMike, Jan 6, 2018
    #74
  15. fdegrove Win User
    Hi,

    Yes, it can.

    Cheers, *Wink
     
    fdegrove, Jan 6, 2018
    #75
Thema:

Windows Client Guidance against speculative execution vulnerabilities

Loading...
  1. Windows Client Guidance against speculative execution vulnerabilities - Similar Threads - Client Guidance against

  2. Microsoft CVE-2017-5715: Guidance to mitigate speculative execution side-channel...

    in AntiVirus, Firewalls and System Security
    Microsoft CVE-2017-5715: Guidance to mitigate speculative execution side-channel...: Microsoft CVE-2017-5715: Guidance to mitigate speculative execution side-channel vulnerabilitiesMicrosoft CVE-2017-5753: Guidance to mitigate speculative execution side-channel vulnerabilitiesMicrosoft CVE-2017-5754: Guidance to mitigate speculative execution side-channel...
  3. Manage Speculative Execution Settings Script for Windows

    in Windows 10 News
    Manage Speculative Execution Settings Script for Windows: Manage Speculative Execution Settings Script is a batch file for Microsoft Windows devices to check and manage the Speculative Execution Protection status on the system. Speculative Execution side-channel attacks are a new class of vulnerabilities that started to make waves...
  4. Windows client guidance for IT Pros to protect against speculative

    in Windows 10 News
    Windows client guidance for IT Pros to protect against speculative: Windows client guidance for IT Pros to protect against speculative execution side-channel vulnerabilities Applies to: Windows Server 2016 Version 1709, Windows Server 2012 R2 Standard, Windows Server 2012 Standard, Windows Server 2008 R2 Service Pack 1, Windows Server 2008...
  5. Guidance to mitigate unconstrained delegation vulnerabilities

    in Windows 10 News
    Guidance to mitigate unconstrained delegation vulnerabilities: Executive Summary Active Directory Forest trusts provide a secure way for resources in a forest to trust identities from another forest. This trust is directional; a trusted forest can authenticate its users to the trusting forest without allowing the reverse.  A...
  6. Surface Guidance for speculative execution side-channel vulnerability

    in Windows 10 News
    Surface Guidance for speculative execution side-channel vulnerability: Surface Guidance to protect against speculative execution side-channel vulnerabilities Applies to: Surface Pro 4, Surface Book, Surface Studio, Surface Pro (latest), Surface Laptop, Surface Pro with LTE Advanced, Surface Book 2 - 13 inch, Surface Book 2 - 15 inch...
  7. SQL Server Guidance against speculative execution vulnerabilities

    in Windows 10 News
    SQL Server Guidance against speculative execution vulnerabilities: SQL Server Guidance to protect against speculative execution side-channel vulnerabilities Summary Microsoft is aware of a new publicly disclosed class of vulnerabilities referred to as “speculative execution side-channel attacks” that affect many modern processors and...
  8. Mitigating speculative execution side channel hardware vulnerabilities

    in Windows 10 News
    Mitigating speculative execution side channel hardware vulnerabilities: On January 3rd, 2018, Microsoft released an advisory and security updates related to a newly discovered class of hardware vulnerabilities involving speculative execution side channels (known as Spectre and Meltdown) that affect AMD, ARM, and Intel CPUs to varying degrees. If...
  9. Azure Stack Guidance against speculative execution vulnerabilities

    in Windows 10 News
    Azure Stack Guidance against speculative execution vulnerabilities: Azure Stack guidance to protect against the speculative execution side-channel vulnerabilities Summary Microsoft is aware of a new publicly disclosed class of vulnerabilities referred to as “speculative execution side-channel attacks” that affect many modern...
  10. Windows Server Guidance against speculative execution vulnerabilities

    in Windows 10 News
    Windows Server Guidance against speculative execution vulnerabilities: Windows Server guidance to protect against speculative execution side-channel vulnerabilities Summary Microsoft is aware of a new publicly disclosed class of vulnerabilities that are referred to as “speculative execution side-channel attacks” that affect many modern...