• Patch Lady – Microcode confusion

    Home » Forums » Newsletter and Homepage topics » Patch Lady – Microcode confusion

    Author
    Topic
    #212608

    Patch Lady here on the Microcode updates. So here’s my take on all of this: Unless you are a nation state, have a key asset in a cloud server, or are
    [See the full post at: Patch Lady – Microcode confusion]

    Susan Bradley Patch Lady/Prudent patcher

    9 users thanked author for this post.
    Viewing 15 reply threads
    Author
    Replies
    • #212609

      And you’re gonna need to buy a (much) bigger screen to make the Pinocchio scale fit there for Intel: Intel Publishes Microcode Security Patches With No Benchmarks Or Profiling Allowed

      1 user thanked author for this post.
    • #212616

      Perfectly said by Susan that these side channel Spectre threats are the least of our problems when we go online.
      Yes they are theoretically possible but not really probable. They are a good marketing tool for Intel and Microsoft though.

      1 user thanked author for this post.
    • #212649

      I’m a bit confused by the use of the ‘Pinocchio’ scale. Is the article suggesting that Microsoft is lying? Isn’t the mantra to ‘never confuse as deception that which can be put down to incompetence or stupidity’?

      Did I read the article incorrectly? (Always possible… 🙂 )

    • #212653

      August 2018: More technical information from Intel regarding the ‘speculative execution side channel update’ with affected CPU’s and pdf link:
      https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html
      https://www.intel.com/content/dam/www/public/us/en/documents/sa00115-microcode-update-guidance.pdf

      If debian is good enough for NASA...
      3 users thanked author for this post.
      • #212844

        Based on the description of the vulnerability, it would seem to require an attacker to be running on the local system, either as a local user, or in a VM.

        Which may be more of an issue if you are running a web server in a virtualized environment.  So commercial hosting or cloud services should pay attention to this.

        But I wouldn’t think that the average home user would need to be very concerned about this risk.  Just my two cents… 😉

        Windows 10 Pro 22H2

        • #212851

          I remember reading recently (at Woody’s?) that a new exploit of the speculative execution vulnerability has been either found in a white hat’s “lab”, or maybe directly out there, that does not require a preliminary infestation with enabling malware. Before this note of mine starts an stampede: Does some one else know anything about this?

          Ex-Windows user (Win. 98, XP, 7); since mid-2017 using also macOS. Presently on Monterey 12.15 & sometimes running also Linux (Mint).

          MacBook Pro circa mid-2015, 15" display, with 16GB 1600 GHz DDR3 RAM, 1 TB SSD, a Haswell architecture Intel CPU with 4 Cores and 8 Threads model i7-4870HQ @ 2.50GHz.
          Intel Iris Pro GPU with Built-in Bus, VRAM 1.5 GB, Display 2880 x 1800 Retina, 24-Bit color.
          macOS Monterey; browsers: Waterfox "Current", Vivaldi and (now and then) Chrome; security apps. Intego AV

    • #212655

      You’re right, people are worrying about this way more than they should have to.

      Marketing people love it when we worry about things we can’t control or understand.

      In my case, with a machine with Xeon x5690 processors not being provided firmware updates by anyone, and continuing to want to run OMG! Positively Ancient Windows 8.1, I’m supposed to believe I’m SOL, right? Better Get Windows 10 on new hardware! Yet this “old” hardware still actually works just fine, and more than meets my needs. Yikes! What can I do?!?

      Maybe we need a new phrase… “Contrived obsolescence”.

      Worse, with all this worry, we really have no idea whatsoever what the impact of patches is going to be on OUR systems when we try to do OUR work… Brand new hardware, of course, is always faster, and will offset all the slowdowns we can imagine.

      All this just to try to reclaim a fleeting, false sense of security once again. So we can worry hard, learn and work all day to fix it, and still end up… Worried.

      Or we can just get Windows 10, let Microsoft manage our systems, and be worry-free! Mother knows best.

      It feels like being in front of a tsunami. You see and know exactly what’s happening but there isn’t all that much you can do about it.

      -Noel

      12 users thanked author for this post.
      • #212753

        Contrived obsolescence instead of “planned obsolescence”, huh Noel?

        1 user thanked author for this post.
    • #212651

      Alert! https://support.microsoft.com/en-us/kb/4100347

      The ****** from Microsoft throwed it at Microsoft Updates; and it’s offered even if the CPU is not listed.. Keep fingers crossed that wushowhide works… And make sure NOT to touch the ‘Update’ button!
      Edit for content: refer to Lounge Rules

      • #212754

        KB43100347 is really superseded by KB4346084.

        the new date for KB43100347 (8/21/2018) is most likely a WU metadata change – nothing else.

    • #212657

      I would also add that anyone running Debian that the microcode’s are delayed because of some sort of licensing hiccup. But I agree with Susan, way too many other concerns actually happening in the wild to be concerned about what might happen with Spectre or Meltdown which has yet to materialize. Maybe because these attack through hardware gives everyone the fits? I would also add some older hardware isn’t getting firmware updates, as some PC makers seem to be skipping their support. So the microcode options is probably best for them. Gibson’s InSpectre check has passed all my PC’s so that’s good enough for me.

    • #212666

      The Pinocchio scale arose from Susan comparing Microsoft’s stated goals with patches to the actuality. These patches fail the “Simple, Predictable, Agile and Transparent” criteria — the SPAT test — in every way.

      Thanks, Woody. I missed the original article which explained the use.

    • #212725

      For folks with Dell systems you can use Dell Command update utility to acquire firmware updates if they are available. This is the first thing I run on a re-image to insure all the proper drivers are installed.

      Just about any system I have re-imaged in the past few months has received a firmware update and Inspectre reports they are fully patched after the update.

      Red Ruffnsore

    • #212760

      I’m still relatively new with Windows 10.
      Could someone please advise the steps for obtaining, downloading, and manually installing one of these recommended updates for version 1709?

      Thanks

      • #212768

        What are your update settings currently?

        Susan Bradley Patch Lady/Prudent patcher

        • #212782

          Windows 10 Pro Ver 1709
          Group update setting 2
          Semi-Annual (not targeted)
          Feature delay 365 days
          Quality Update delay (varies until Woody OK then set to 0)
          wushowhide to selectively hide and hold

          To-date have never had the need to do a manual update from the catalog. In my case looks like two (2).  KB4346085 and KB4078407 to enable.

          Gibson InSpectre (8) shows I have protection for Meltdown and Spectre (my new system came in March with latest BIOS update from Asus that had a firmware update. Nothing since.

    • #212804

      I may be wrong, but isn’t the excerpt below from Microsoft regarding the Windows 7 August Monthly Rollup update KB4343900 say its installing these same micocodes?

      This security update includes improvements and fixes that were a part of update KB4338821 (released July 18, 2018) and addresses the following issues:

        Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel® Core® processors and Intel® Xeon® processors (CVE-2018-3620 and CVE-2018-3646). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the Windows Client and Windows Server guidance KB articles. (These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions.)

      • Addresses an issue that causes high CPU usage that results in performance degradation on some systems with Family 15h and 16h AMD processors. This issue occurs after installing the June 2018 or July 2018 Windows updates from Microsoft and the AMD microcode updates that address Spectre Variant 2 (CVE-2017-5715 – Branch Target Injection).

      • Provides protections against an additional vulnerability involving side-channel speculative execution known as Lazy Floating Point (FP) State Restore (CVE-2018-3665) for 32-Bit (x86) versions of Windows.


      EDIT html to text – content may not appear as intended

    • #212890

      News in from theRegister: https://www.theregister.co.uk/2018/08/23/intel_microcode_license/

      Intel has backtracked on the license for its latest microcode update that mitigates security vulnerabilities in its processors – after the previous wording outlawed public benchmarking of the chips.

      If debian is good enough for NASA...
      1 user thanked author for this post.
      • #212925

        Wow!  Intel’s gift to AMD that just keeps on giving, LOL!

        Also I noticed that the linked article mentions the need to disable hyperthreading as part of the latest mitigation.

        Not good!

        I benchmark tested my CPU recently with hyperthreading disabled in the BIOS, and got a full 30% decrease in performance.  Could be that since my older Ivy Bridge Core i3 only has two physical cores, that it really needs the hyperthreading enabled for full performance.

        Perhaps if you have a quad-core CPU, or one of the newer i5’s with six cores, you may not feel the hit as much.

        So I’ll be leaving my hyperthreading enabled until I can afford a hardware upgrade… 🙂

        Windows 10 Pro 22H2

        2 users thanked author for this post.
    • #212943

      How can you make a worst publicity for yourself by attracting attention to an issue by specifically putting a ridiculous clause that highlights the issue in bold. The first thing people will think is why would anyone do that if they don’t have anything to hide?

      Susan, I am not sure if you talk about all side-channels vulnerabilities in your first paragraph. It is not clear to me. I would like to comment about all side-channels vulnerabilities. From what I gathered out of them, I agree with you that we are in this for years. I also think right now there is more risk to having the normal methods of malware delivery used and I would say that a worm exploitable vulnerability is much more problematic in practice right now than a Meltdown type flaw for home users.

      But I would respectfully submit a few distinctions to see if it makes sense to you and others or if my understanding is wrong since security is a very complex subject.

      There is the Spectre type flaw that is exploitable using only javascript in a browser and that seemed maybe a bit fixed at some point but not really for the long term.  I don’t know where we stand now on this, but thinking other vulnerabilities of this type might exist is a bit scary since we talk about drive-by download type of vulnerability that can read protected memory. This is not a small thing, to me. Not knowing if it is exploited in the wild or not is not that reassuring to me. The great thing about this type of flaw is precisely that you can silently spy without being detected, by temporarily injecting code in a targeted web site. Not being perceived as active in the wild is a big asset for those in this business. You can target someone, put a spying code on a website this person goes to, read private memory, then just remove the code when done.

      Then, there are the vulnerabilities that need code to run on the machine. In that sense, I don’t see it as that problematic to normal users except when they have a false sense of security when they test potentially unsafe code in a VM when that code can cross VM boundaries. So yes, for people who don’t rely on these safeguards and just run their trusted apps, the risk doesn’t seem significantly different than any rogue code that needs to be put on the machine and run. But we need to remember the VM boundary has been broken at a lower level and it is not a minor thing.

      I have been saying this since this whole mess started, but I don’t think we can assume at all that it is the end of it. It is just a beginning and I predict we will see more creative use of similar flaws in the future. I think some spying agencies and hackers are probably working very hard to find other similar flaws they could exploit silently and I don’t feel we can consider that VM boundary hasn’t been broken or that cloud services are that safe. If I was a big company with IP to steal, I wouldn’t put the plans of my latest product on a shared cloud service.

      I also think that the Spectre type vulnerability has also opened up the possibility of breaking the distinction between protected and user memory without having to run compiled code and this is also quite problematic on a theoretical level.

      I don’t want to scare people and I get it that one might choose to take the small chance perceived of issues due to non patching to avoid other problems or performance issues, especially on the normal user front.

      But I think that we must not dismiss the vulnerabilities either as I think they are groundbreaking, shattering long-time held expectations, just like I realized a very long time ago that a picture or music file could contain malware when I understood what a buffer overflow was and this idea that if it is not an executable it is safe went down the drain for good. Maybe those specific vulnerabilities won’t be easily exploited, but I think it is possible that we will discover one that is easier to exploit in the future. Hopefully, that won’t be the case, but the can of worms have been open and it can’t be closed.

      If we need to disable hyperthreading, the price of security is way too high for many, especially in relation to the risk. But this doesn’t make the flaws less problematic and it doesn’t look good for the future and unlike some that thinks about a possible Intel-Microsoft conspiracy to sell newer PCs, I think it just makes me want to postpone buying a new PC for a very long time until we have a better grasp of all this and be more confident that there is less possible undiscovered similar flaws hiding in the chips.

      5 users thanked author for this post.
      • #213127

        Hi AlexEiffel,

        I am pretty much on the same page in terms of your thoughts. And like you, I do not want to jump on the paranoia bandwagon. Instead, and just like you have done, I will present some additional “food for thought” for everyone to consider…

        Think about MS’s constant telemetry gathering in terms of Meltdown and Spectre. Exploiting Meltdown is relatively easy to do. This is why all of the major web browser vendors worked really hard to patch their web browsers in order to prevent any remote Meltdown exploits via JavaScript and via JavaScript pooling. Why did they rush to do this? Because the issue is just how can any AV software actually detect such exploits since no malware techniques are required and since code is easily obfuscated. Exploiting Spectre is much harder to do, and with either the same or perhaps harder difficulties for any AV program to detect. The upshot is that no AV manufacturer presently is capable of reliably detecting actual Meltdown and Spectre exploits, aside from simple variants of Proof Of Concept (POC) code. Don’t believe me? Ask them. While you are at it, ask them how good they are at detecting zero day ransomware.

        POC code was recently published which proves that Spectre can now be exploited remotely. While this is bad, getting any results is really, really slow. Yet herein is the rub. MS’s telemetry contains EXACTLY the kind of information which hackers would WANT to gather. If I was a hacker, using Meltdown and Spectre exploits can literally “Show Me The Way” (reference to the Peter Frampton song) in terms of ALL software which loads on bootup and which gets subsequently launched by the user. This is inherently useful information for any hacker or state actor. And this is the inherent risk of allowing MS to gather deep telemetry on any Windows computer. The upshot is that MS’s telemetry gathering potentially is an inherent attack vector — not only via Meltdown and Spectre, but also via intercepting and returning malformed responses from MS’s telemetry gathering servers which are located around the world. You all Group A users are totally relying on MS’s telemetry to properly reject MS telemetry server responses, man-in-middle responses, or whatever, in terms of buffer underruns and buffer overruns which could gain access to privileged memory. In my opinion, this is obviously brewing into a potential perfect storm. Don’t believe me? Well, how about the Microsoft Total Meltdown vulnerability which MS themselves created earlier this year, when MS was trying to mitigate Meltdown and Spectre. Total Meltdown lasted for three full months. Note that MS never acknowledged their unbelievable blunder, obviously for fear of class action lawsuits. And note that MS has retroactively removed all mention that a certain update would install, regardless of whether or not a certain registry key was set. It is what it is.

        Best regards,

        –Michael

        3 users thanked author for this post.
    • #213199

      For those who have a Fujitsu (- Siemens) system and are interested to know, I found this overview dated August 24:

      (Spectre & Meltdown) Security Review:
      List of affected Fujitsu Products
      Reference: Security vulnerabilities (CVE 2017- 5715, CVE 2017- 5753, CVE 2017- 5754, SA-00088)

      which also shows whether an update is available or not, or when the update will be pushed (weeks 36, 38 and 40).

      1 user thanked author for this post.
    • #213258

      Susan:

      I’ve followed your patching advice for years with Windows Secrets and now with Askwoody’s excellent website.

      Talking about “Microcode confusion”, I’m still not clear if I should install Microsoft .NET Framework 4.7.2  KB4054530 on my Windows 7 Ultimate PC?

      I currently have 4.7.1. Is it safe or not to install? And is it really necessary on a home PC?

      Thanks for all the great advice over the years.

      BD

      Edit to remove HTMLPlease use the “Text” tab in the post entry box when you copy/paste

    • #213613

      All microcode updates are expired now (WSUS). Available only due Microsoft update catalog.

    Viewing 15 reply threads
    Reply To: Patch Lady – Microcode confusion

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information: