Windows 10: Windows Client Guidance against speculative execution vulnerabilities

Discus and support Windows Client Guidance against speculative execution vulnerabilities in Windows 10 News to solve the problem; For all the ASUS motherboard owners, Asus has released a list of the updated bios versions that will be released to fix this issue, in some cases, some... Discussion in 'Windows 10 News' started by Brink, Jan 4, 2018.

  1. OldMike65 Win User

    Windows Client Guidance against speculative execution vulnerabilities


    For all the ASUS motherboard owners, Asus has released a list of the updated bios versions that will be released to fix this issue, in some cases, some of these bios updates have NOT been released yet. Link below.
    ASUS Global
     
    OldMike65, Jan 6, 2018
    #76
  2. Cliff S New Member

    For the Maximus X Series boards, it was released(uploaded ) already on the 3rd of January, they were fast!
     
    Cliff S, Jan 6, 2018
    #77
  3. OldMike65 Win User
    Yes Asus released all of their Intel 370's boards already. All the others have not been released as of yet.
     
    OldMike65, Jan 6, 2018
    #78
  4. Windows Client Guidance against speculative execution vulnerabilities

    This is what I get. ASUS M4N68-M V2 and AMD Phenom II, NVIDIA nForce 630a chip-set and AMD CPU. Old stuff, but its my main desktop PC. SA-00086 says This system is not vulnerable. Not so good results with the Power Shell commands though. There haven't been any BIOS updates for it in years. Already running the latest dated 2012/01/18. Will have to reboot to double check, pretty sure I'm running the latest though.


    Windows Client Guidance against speculative execution vulnerabilities [​IMG]
     
    alphanumeric, Jan 6, 2018
    #79
  5. Looks like I wasn't running the latest BIOS, just flashed to the latest but it didn't change anything as far as I can tell, still recommends getting a newer BIOS. Not sure what to do now?

    Windows Client Guidance against speculative execution vulnerabilities [​IMG]
     
    alphanumeric, Jan 6, 2018
    #80
  6. clam1952 Win User
    SA-00086 is for the Intel management Engine flaw from last autumn / fall and is nothing to do with the current Spectre Meltdown flaws which is what you are checking with the Powershell scripts. Two separate issues, AMD is not affected by the Intel management flaw so does not require that fix, only applicable for Intel systems.

    The forthcoming hardware patches so far are for Intel processors only.
    For AMD the only "fix" at this point is the one included in the latest Windows update. As far as I'm aware AMD are not releasing any hardware patches yet and possibly do not need to? jury appears to be out on that at present.
     
    clam1952, Jan 6, 2018
    #81
  7. Cliff S New Member
    Take a look here, and click "show more": Facts about Side-Channel Analysis and Intel Products
     
    Cliff S, Jan 6, 2018
    #82
  8. axe0 New Member

    Windows Client Guidance against speculative execution vulnerabilities

    Isn't software a part of the product?
     
  9. Windows update say's I'm fully up to date. Yeah, I knew what SA 00086 was for, just posting info on my checks. Might have confused things mentioning it though, like you say not relevant for AMD systems. I still trying to sort this all out in my head, so far all I'm getting is a head ache. *Banghead
     
    alphanumeric, Jan 6, 2018
    #84
  10. CountMike New Member
    Not of CPU, only microcode and FW.
     
    CountMike, Jan 6, 2018
    #85
  11. Ah OK, but what part specifically? That's all to do with Intel, My system is AMD CPU with NVidia chip-set. Thanks for the link, I will have a look see, nothings jumping out at me that makes any sense though?
     
    alphanumeric, Jan 6, 2018
    #86
  12. clam1952 Win User
    I think that in the case of AMD based on what little they have said so far they are pretty much covered by the Microsoft patch, I also have an AMD Phenom II rig but with an AMD chipset not my main one though, last bios was years ago, actually I've never updated it, if it ain't broke.... I'm not going to worry about it.
     
    clam1952, Jan 6, 2018
    #87
  13. Windows Client Guidance against speculative execution vulnerabilities

    Ok for me the power shell commands show

    BTI Hardware Preset :False
    BTI Windows Support Present :True
    BTI Windows Support Enabled :False
    BTI Disabled By No Hardware Support :True

    Can I take that to mean I'm safe because its not used, no hardware present?

    And same for KVA?

    KVA Shadow Pci Enabled : false

    At first glance I thought I was venerable, but taking a closer look I think I'm fine, assuming I interpreted what each true false line actually means?
     
    alphanumeric, Jan 6, 2018
    #88
  14. clam1952 Win User
    That's as I'm reading it. Hopefully someone will come up with a better and easy to understand method of checking, well I can dream....
     
    clam1952, Jan 6, 2018
    #89
  15. Cliff S New Member
    An Update on AMD Processor Security | AMD
     
    Cliff S, Jan 6, 2018
    #90
Thema:

Windows Client Guidance against speculative execution vulnerabilities

Loading...
  1. Windows Client Guidance against speculative execution vulnerabilities - Similar Threads - Client Guidance against

  2. Microsoft CVE-2017-5715: Guidance to mitigate speculative execution side-channel...

    in AntiVirus, Firewalls and System Security
    Microsoft CVE-2017-5715: Guidance to mitigate speculative execution side-channel...: Microsoft CVE-2017-5715: Guidance to mitigate speculative execution side-channel vulnerabilitiesMicrosoft CVE-2017-5753: Guidance to mitigate speculative execution side-channel vulnerabilitiesMicrosoft CVE-2017-5754: Guidance to mitigate speculative execution side-channel...
  3. Manage Speculative Execution Settings Script for Windows

    in Windows 10 News
    Manage Speculative Execution Settings Script for Windows: Manage Speculative Execution Settings Script is a batch file for Microsoft Windows devices to check and manage the Speculative Execution Protection status on the system. Speculative Execution side-channel attacks are a new class of vulnerabilities that started to make waves...
  4. Windows client guidance for IT Pros to protect against speculative

    in Windows 10 News
    Windows client guidance for IT Pros to protect against speculative: Windows client guidance for IT Pros to protect against speculative execution side-channel vulnerabilities Applies to: Windows Server 2016 Version 1709, Windows Server 2012 R2 Standard, Windows Server 2012 Standard, Windows Server 2008 R2 Service Pack 1, Windows Server 2008...
  5. Guidance to mitigate unconstrained delegation vulnerabilities

    in Windows 10 News
    Guidance to mitigate unconstrained delegation vulnerabilities: Executive Summary Active Directory Forest trusts provide a secure way for resources in a forest to trust identities from another forest. This trust is directional; a trusted forest can authenticate its users to the trusting forest without allowing the reverse.  A...
  6. Surface Guidance for speculative execution side-channel vulnerability

    in Windows 10 News
    Surface Guidance for speculative execution side-channel vulnerability: Surface Guidance to protect against speculative execution side-channel vulnerabilities Applies to: Surface Pro 4, Surface Book, Surface Studio, Surface Pro (latest), Surface Laptop, Surface Pro with LTE Advanced, Surface Book 2 - 13 inch, Surface Book 2 - 15 inch...
  7. SQL Server Guidance against speculative execution vulnerabilities

    in Windows 10 News
    SQL Server Guidance against speculative execution vulnerabilities: SQL Server Guidance to protect against speculative execution side-channel vulnerabilities Summary Microsoft is aware of a new publicly disclosed class of vulnerabilities referred to as “speculative execution side-channel attacks” that affect many modern processors and...
  8. Mitigating speculative execution side channel hardware vulnerabilities

    in Windows 10 News
    Mitigating speculative execution side channel hardware vulnerabilities: On January 3rd, 2018, Microsoft released an advisory and security updates related to a newly discovered class of hardware vulnerabilities involving speculative execution side channels (known as Spectre and Meltdown) that affect AMD, ARM, and Intel CPUs to varying degrees. If...
  9. Azure Stack Guidance against speculative execution vulnerabilities

    in Windows 10 News
    Azure Stack Guidance against speculative execution vulnerabilities: Azure Stack guidance to protect against the speculative execution side-channel vulnerabilities Summary Microsoft is aware of a new publicly disclosed class of vulnerabilities referred to as “speculative execution side-channel attacks” that affect many modern...
  10. Windows Server Guidance against speculative execution vulnerabilities

    in Windows 10 News
    Windows Server Guidance against speculative execution vulnerabilities: Windows Server guidance to protect against speculative execution side-channel vulnerabilities Summary Microsoft is aware of a new publicly disclosed class of vulnerabilities that are referred to as “speculative execution side-channel attacks” that affect many modern...