Intel Microcode Updates KB4100347, KB4090007 (July 2018)

[German]Microsoft has released two Intel Microcode updates KB4100347 and KB4090007 on July 24, 2018. One update is for Windows 10 V1803, the other for Windows 10 V1709. 


Advertising

Update KB4100347 for Windows 10 V1803

Update KB4100347 (Intel Microcode Update) is available for Windows 10 V1803 and closes the following vulnerability:

Intel recently announced that they have completed their validations and started to release microcode for recent CPU platforms related to Spectre Variant 2 (CVE 2017-5715 [“Branch Target Injection”]).

The update applies to several Intel processors listed in the KB article. It is a standalone update for Windows 10 version 1803 (Windows 10 April 2018 update) and Windows Server version 1803 (Server Core). This update is distributed across the Microsoft Update Catalog, and also includes Intel microcode updates that were released when released for these operating systems (RTM).

Microsoft intends to offer additional microcode updates from Intel for this operating system via the KB article as soon as they are available for Microsoft. Vulnerability protection is enabled by default for Windows client systems, so no action is required.

Please make sure that protection against Spectre Variant 2 for servers is enabled via the registry settings documented in the article Windows Server guidance to protect against speculative execution side-channel vulnerabilities.

Microsoft advises: Check with your device manufacturer and Intel through their websites for microcode recommendations for your device before applying this update to your device.


Advertising

Update KB4090007 for Windows 10 V1709

Update KB4090007 is the same Intel Microcode update as described above, but is available for Windows 10 V1709. The list of supported updates is listed in the KB article. There you will also find further details and the link to the Microsoft Update Catalog.


Advertising


This entry was posted in Security, Update, Windows and tagged , , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *