![]() Application of this payload specifically disables only the mitigation against CVE-2017-5715 – “Branch target injection vulnerability.”Īs of January 25, 2018, there are no known reports to indicate that this Spectre variant 2 (CVE 2017-5715 ) has been used to attack customers. If you are running an impacted device, this update can be applied by downloading it from the Microsoft Update Catalog website. This update covers Windows 7 (SP1), Windows 8.1, and all versions of Windows 10, for client and server. While Intel tests, updates and deploys new microcode, we are making available an out of band update today, KB4078130, that specifically disables only the mitigation against CVE-2017-5715 – “Branch target injection vulnerability.” In our testing this update has been found to prevent the behavior described. We understand that Intel is continuing to investigate the potential impact of the current microcode version and encourage customers to review their guidance on an ongoing basis to inform their decisions. On January 22, 2018, Intel recommended that customers stop deploying the current microcode version on impacted processors while they perform additional testing on the updated solution. Intel has reported issues with recently released microcode meant to address Spectre variant 2 (CVE 2017-5715 Branch Target Injection) – specifically Intel noted that this microcode can cause “ higher than expected reboots and other unpredictable system behavior” and then noted that situations like this may result in “ data loss or corruption.” Our own experience is that system instability can in some circumstances cause data loss or corruption. Here are some answers about the recently discovered security vulnerability that impacts chips from several different manufacturers. We encourage you to keep your devices up to date and secure by installing Windows security updates monthly. Operating system and firmware updates can be installed in either order. ![]() Antivirus software updates should be installed first. Note: Customers who only install the latest security updates from Microsoft will not be fully protected against the vulnerabilities. You will also need to install applicable firmware updates from your device manufacturer. Firmware updates should be available on your device manufacturer's website. Install any firmware updates from your device manufacturer. For instructions, see Windows Update: FAQ. If automatic updates are turned on, the updates should be automatically delivered to you, but you should still confirm that they’re installed. Keep your device up to date by turning on automatic updates.Ĭheck that you’ve installed the latest Windows operating system security update from Microsoft. Check your software manufacturer's website for their latest info. ![]() Make sure your antivirus software is up to date. To take advantage of available protections, follow these steps to get the latest updates for both software and hardware: Many devices and applications will be affected by this flaw, including any operating systems such as Windows that run on the affected chips. Microsoft is aware of the security vulnerability that impacts chips from several different manufacturers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |