Lucene search

K
mskbMicrosoftKB4073065
HistoryMay 21, 2018 - 7:00 a.m.

KB4073065: Surface guidance to protect against silicon-based microarchitectural and speculative execution side-channel vulnerabilities

2018-05-2107:00:00
Microsoft
support.microsoft.com
65

7.6 High

AI Score

Confidence

High

0.976 High

EPSS

Percentile

100.0%

KB4073065: Surface guidance to protect against silicon-based microarchitectural and speculative execution side-channel vulnerabilities

Introduction

Since January 2018, the Surface team has been publishing firmware updates for a class of silicon-based issues that involve microarchitectural and speculative execution side-channel vulnerabilities. The Surface team continues to work closely with the Windows team and industry partners to protect customers. To get all available protection, both firmware and Windows system updates are required.

Summary

__

Vulnerabilities announced in June 2022

The Surface team is aware of new silicon-based microarchitectural and speculative execution side-channel attack variants that also affect Surface products. For more information about the vulnerabilities and mitigations, see the following security advisory:

__

Vulnerabilities announced in May 2019

The Surface team is aware of new speculative execution side-channel attack variants that also affect Surface products. Mitigation of those vulnerabilities requires an operating system update and a Surface UEFI update that includes new microcode. For more information about the vulnerabilities and mitigations, see the following security advisory:

__

Vulnerability announced in August 2018

The Surface team is aware of a new speculative execution side-channel attack called L1 Terminal Fault (L1TF) and assigned CVE-2018-3620 (OS and SMM) and CVE-2018-3646 (VMM). Affected Surface products are the same as in the “Vulnerabilities Announced in May 2018” section of this article. The microcode updates that mitigate the May 2018 findings also mitigate L1TF (CVE-2018-3646). For more information about the vulnerability and mitigations, see the following security advisory:

  • Microsoft Security Advisory ADV180018This advisory includes the following vulnerabilities:
    • CVE-2018-3620
    • CVE-2018-3646
      The security advisory proposes that customers who are using Virtualization Based Security (VBS), which includes security features such as Credential Guard and Device Guard, should consider disabling Hyper-Threading in order to fully eliminate the risk from L1TF.

__

Vulnerabilities announced in May 2018

The Surface team has become aware of new speculative execution side-channel attack variants that also affect Surface products. Mitigation of those vulnerabilities requires UEFI updates that use new microcode. For more information about the vulnerabilities and mitigations, see the following security advisories:

__

Vulnerabilities announced in January 2018

The Surface team is aware of the publicly disclosed class of vulnerabilities that involve speculative execution side-channel (known as Spectre and Meltdown) that affect many modern processors and operating systems, including Intel, AMD, and ARM. For more information about the vulnerabilities and mitigations, see the following security advisory:

More information

The Surface Hub operating system, Windows 10 Team, has implemented defense-in-depth strategies. Because of this, we believe that exploits that use these vulnerabilities are significantly reduced on Surface Hub when running Windows 10 Team operating system. For more information, see the following topic on the Windows IT Pro Center website: Differences between Surface Hub and Windows 10 Enterprise. The Surface team is focused on making sure that our users have a secure and reliable experience. We will continue to monitor and update devices as required to address these vulnerabilities and keep the devices reliable and secure.

References

__

Third-party information disclaimer

We provide third-party contact information to help you find technical support. This contact information may change without notice. We do not guarantee the accuracy of this third-party contact information.