Jump to content

Intel Inspectre Meltdown checker


aliyx
 Share

Recommended Posts

Easily examine and understand any Windows
system's hardware and software capability to
prevent Meltdown and Spectre attacks.

 

https://www.grc.com/inspectre.htm

 

The patches are applicable to specific CPU models only, which are identified by each chip's “CPUID.” For this reason, InSpectre now prominently displays the system's processor CPUID at the top of its system summary.

Please check this page on Microsoft's website to see whether a microcode patch for your CPU, determined by its CPUID, is available at any time:
 

KB4090007: Intel microcode updates



You can also use your favorite Internet search engine to search for the string “KB4090007” which should always take to that page and to its related Microsoft Update Catalog page to obtain the specific Windows update.

Link to comment
Share on other sites

Update on Speculative Execution and Indirect Branch Prediction Side Channel Analysis Method

Windows OS Hot Fix Update

The OS Build version and KB number listed below are the latest version released from Microsoft to solve this issue. Please make sure your computer has been updated.

OS Build
OS Security updates
Internet Explorer 11
Microsoft Edge
Windows 7: OS build 6.1.7600.xx
Please upgrade to Win 7 with SP1, then using Win 7 SP1 security updates
Windows 7 (SP1): OS build 6.1.7601.xx
N/A
Windows 8: OS build 6.2.9200.xx
Please upgrade Win 8.1, then using Win 8.1 security updates
Windows 8.1: OS build 6.3.9200.xx
N/A
Windows 8.1 (SP1): OS build 6.3.9600.xx
N/A
Win10 TH1 : Version 1507, OS build 10240.xx
Please upgrade your OS to TH2 above, then using their security updates
Win10 TH2 : Version 1511, OS build 10586.xx
Win10 RS1 : Version 1607, OS build 14393.xx
Win10 RS2 : Version 1703, OS build 15063.xx
Win10 RS3 : Version 1709, OS build 16299.xx

Visit the Microsoft Security TechCenter (https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002) to learn more about the security updates.

Edited by aliyx
Link to comment
Share on other sites

Intel fixes a security flaw with firmwares 11.xxx

(Shift of 06/01/18) After updating the Firmware Management Engine (ME) for security problems on Intel chipsets 1, 2, 3, 4, 5, 6, 7 generations ( firmware ME Series 6 7, 8, 9, 10 & 11 ) which exclusively affect professional PCs (Firmware 5MB), Intel offers two new firmware version 11.8.50.3399 & 11.8.50.3425 (version 1.5 & 5MB) that touches all chipsets 6th, 7th & 8th generation (see list below), whether professional or personal on PC Desktops, Laptops, ....

  • 6th, 7th & 8th Generation Intel® Core ™ Processor Family (eg Z170, Z270, Z370, B150, H110, H170, B250, H270, Q170, Q270)
  • Intel® Xeon® Processor E3-1200 Product Family v5 & v6
  • Intel® Xeon® Processor Family Scalable
  • Intel Xeon Processor Family W
  • Intel® Atom® C3000 Processor Family
  • Apollo Lake Intel® Atom Processor e3900 series
  • Apollo Lake Intel® Pentium ™
  • Celeron ™ N and J Series Processors

Firmwares affected by this vulnerability to vulnerability and Serie ME: 11.0.xx, 11.5.xx, 11.6.xx, 11.7.xx, 11.10.xx, 11.20.xx

More information   https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00086&languageid=en-fr

Link to comment
Share on other sites

  • 1 month later...
  • 2 weeks later...

MCU Recommendations
The following table provides details of availability for microcode updates
currently planned by Intel. Changes since the previous version are
highlighted in yellow.

2
LEGEND:
Production Status:
Planning – Intel has not yet determined a schedule for this MCU.
Pre-beta – Intel is performing early validation for this MCU.
Beta – Intel has released this production signed MCU under NDA for all customers to validate.
Production – Intel has completed all validation and is authorizing customers to use this MCU in a production environment.
Stopped – After a comprehensive investigation of the microarchitectures and microcode capabilities for these products, Intel has determined to not release
microcode updates for these products for one or more reasons including, but not limited to the following:

Micro-architectural characteristics that preclude a practical implementation of features mitigating Variant 2 (CVE-2017-5715)
Limited Commercially Available System Software support
Based on customer inputs, most of these products are implemented as “closed systems” and therefore are expected to have a lower likelihood of
exposure to these vulnerabilities.
Pre-Mitigation Production MCU:

For products that do not have a Production MCU with mitigations for Variant 2 (Spectre), Intel recommends using this version of MCU. This does not impact
mitigations for Variant 1 (Spectre) and Variant 3 (Meltdown).

newsroom.intel.com/microcode

Link to comment
Share on other sites

  • 5 months later...
  • 3 months later...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...