Specter vulnerability is still an obsession for Intel CPU users, Microsoft officially offers a solution
Remember Specter and Meltdown, the two CPU vulnerabilities that have caused terror to PC users around the world since they were first discovered in 2017? Variant 2 of the nightmare called Specter once again reappeared in Intel CPUs, forcing Microsoft to urgently publish a guide on how to enable mitigation measures.
In a post on the Microsoft Security Response Center, the company said:
On April 9, 2024, we published information about the vulnerability CVE-2022-0001 | Intel Branch History Injection, which describes Branch History Injection (BHI), a specific form of intra-mode BTI. This vulnerability occurs when an attacker can manipulate branch history before switching from user mode to supervisor mode (or from VMX on-root/guest mode to root mode).
BHI is essentially a proof-of-concept attack that affects CPUs that are already vulnerable to exploitation, even with all the mitigations in place. As reported by Phoronix experts, this new exploit can bypass Intel's Enhanced Indirect Branch Restricted Speculation (EIBRS) (or CSV2 in the case of ARM CPUs) by using a branch history cache. buffer - BHB). BHI re-enables the cross-privileged Specter-v2 exploit, allowing kernel-to-kernel (also known as BTI in local mode) exploits and paving the way for malicious actors to inject prediction entries into History Injection aims to leak kernel data. As a result, arbitrary kernel memory on the targeted CPUs could be leaked, leading to the potential disclosure of confidential information, including passwords.
This means that most modern Intel CPUs from 6th generation (Skylake) onwards can be affected by the vulnerability. In addition, many core architectures from ARM, including Cortex A15, A57, A72 as well as Neoverse V1, N1 and N2 are also in danger.
The latest guide published by Microsoft deals with editing the Windows Registry and as such, there will also be a lot of warnings that users need to be cautious of.
We are providing the following registry information to enable mitigations for this CVE.
To enable mitigation of CVE-2022-0001 on Windows devices and clients using Intel processors:
reg add "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management" /v FeatureSettingsOverride /t REG_DWORD /d 0x00800000 /f reg add "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 0x00000003 /f
With that said, after applying mitigation measures, there may be some negative effects on system performance. You can find more detailed technical information at the source links below.
CVE-2022-0001 Branch History Injection
Branch History Injection and Intra-mode Branch Target Injection (Intel)
You should read it
- Intel will stop releasing patches for the Specter v2 security hole on some older CPUs
- Specter V2 vulnerability re-appears to attack Intel, Arm CPUs, AMD chips are not affected
- Microsoft released an emergency patch for Windows, turned off the Specter patch, causing a drop in system performance
- The security feature prevents the Specter vulnerability, which makes Chrome account for 10-13% more computer RAM
- HP introduced Specter 13x2 and Specter 13 laptops
- Intel: After installing Specter / Meltdown vulnerability patch your computer will slow down to 10%
- There is an iOS and Mac update that fixes the Specter vulnerability
- How to know if your Windows computer is affected by Meltdown and Specter?
May be interested
- Microsoft released an Intel chip patchmicrosoft has just released an unusual security update for windows to fix bugs on intel, amd and arm chips recently.
- New dangerous vulnerability in Intel CPU: Works like Specter and Meltdown, threatening all PCs and the cloudan extremely serious new class of intel chip vulnerabilities has been discovered by security researchers at graz university of technology, if successful exploitation of the bad guys can take advantage of it to steal sensitive information online. next from the processor.
- How to know if your Windows computer is affected by Meltdown and Specter?how to know if your windows computer is affected by meltdown and specter? let tipsmake.com learn more about the extent of the impact of the vulnerabilities and whether they affect your computer or not in this article!
- Intel claims: New security updates help the computer to be 'immune' to Meltdown and Specterintel claims that its new security patches will help the computer be immune to two extremely serious security bugs, attracting users' attention during the past two days: meltdown and specter. also in this statement, the company confirmed that by the end of the week, 90% of computers will be protected.
- The security feature prevents the Specter vulnerability, which makes Chrome account for 10-13% more computer RAMsite isolation is a security feature that separates the layout of individual web pages in order to limit this web attack to the other web. this feature will be turned on by default for most chrome users on win, mac, linux and chrome os to protect computers from attacks through the specter vulnerability.
- Intel faces a new vulnerability called BranchScopenew researchers have discovered a new off-the-shelf attack technique called branchscope that could affect all devices using intel processors.
- Overview of vulnerabilities on Intel, AMD, ARM chips: Meltdown and Spectertwo newly discovered major computer chip security bugs, called meltdown and specter, affect most of the devices manufactured in the last 20 years. the level of influence of these two security bugs on devices is still being calculated, but it can lead to the server on the cloud computing platform being compromised, leading to bad effects. than.
- Instructions on how to fix blue screen error, cannot start when installing Microsoft patcheswhen meltdown and specter vulnerabilities appeared in intel, amd and arm chips, microsoft released a lot of updates on pc and mobile. however, these updates make windows 7/10 blue, unable to boot.
- This is a way to protect Linux Mint from Meltdown and Specternew linux developers have officially voiced the two vulnerabilities of meltdown and specter, suggesting ways to help users protect their computers.
- Intel released Microcode for CPU Linux to fix Meltdown and Specteron january 8, intel released micro-data files for linux microprocessors to mitigate the effects of meltdown and specter vulnerabilities.