Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Microsoft publishes new Registry security mitigation for Intel processors (Spectre)
#1
Exclamation 
Quote:About six years ago, vulnerabilities were discovered that affected most Intel and AMD processors. The vulnerabilities, Spectre and Meltdown, can be exploited to read sensitive data from attacked computer systems.

Intel released an update for one of the Spectre variants, disclosed officially on March 8, 2022. Microsoft implemented mitigations in client and server versions of Windows as a response to this.

These are disabled by default. The main reason for this seems to be potential performance impacts that comes with the implementation.

This guide walks you through the steps of configuring Windows to enable the mitigations and finding out if your processor is affected.

Is your processor affected?

The very first thing you may want to do is check if your processor is on Intel's list of affected CPUs.
  • If it is on the list, you may enable the mitigation to protect the system against potential attacks.
  • If it is not on the list, you can skip the remainder of the article.
Here is how you find out:
  1. Open Start > Settings > System > About and check the listed processor.
  2. Load the following two resource websites: Nist.gov and Intel's Affected Processors website.
Check to see if the installed processor is listed on these websites. You may want to use the browser's search to find the information quickly.

Microsoft's Registry tweak to protect against the vulnerability

[Image: intel-processor-spectre-mitigation.png]

If your processor is on the list, you may change the Registry keys to enable the mitigations.

Note: implementation may affect performance. While I cannot recommend not enabling these mitigations, the risk of attacks against home PCs is most of the time neglectable.

Backup: it is highly recommended to back up the system drive before implementing the mitigation. Not with Windows' Backup App, which is useless for the purpose, but with a full backup program like Paragon Backup & Recovery Free.

Here is what you need to do on Windows devices and clients to mitigate CVE-2022-0001:
  1. Open Start, type CMD, and select Run as administrator. This launches an elevated command prompt window.
  2. Confirm the UAC prompt by selecting yes.
  3. Execute the following two commands by pasting them and pressing the Enter-key after each:
    1. reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 0x00800000 /f
    2. reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 0x00000003 /f
  4. Restart the computer after both Registry keys have been added.
Tip: you may want to monitor performance to make sure that day-to-day operations are not severely impacted by the mitigation.
Interestingly enough, Microsoft has also revealed how Linux users may mitigate the vulnerability: "Specify spectre_bhi=on on the kernel command line".

Closing Words

While it may be critical for organizations to implement the mitigation, risks of attacks are relatively low for home users.

What about you? Have you implemented Spectre / Meltdown mitigations on your PCs?
...
Continue Reading
[-] The following 1 user says Thank You to harlan4096 for this post:
  â€˘ damien76
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Windows Repair Toolbox 3.0.4.0
An updated version...harlan4096 — 16:25
SecureAPlus 6.8.1
SecureAPlus 6.8.1:...harlan4096 — 16:22
CrystalDiskInfo 9.3.0
Changes in 9.3.0: ...harlan4096 — 06:59
Microsoft OneDrive on the web is adding ...
Microsoft has anno...harlan4096 — 06:08
Vivaldi Stable 6.7 (3329.21)
Vivaldi Stable 6.7...harlan4096 — 17:09

[-]
Birthdays
Today's Birthdays
avatar (72)divinenews
avatar (49)plajhunTat
Upcoming Birthdays
avatar (26)akiratoriyama
avatar (46)Jerrycix
avatar (38)awedoli
avatar (80)WinRARHowTo
avatar (36)owysykan
avatar (47)beautgok
avatar (37)axuben
avatar (43)talsmanthago
avatar (29)mocetor
avatar (44)piomaibhaict
avatar (49)kingbfef
avatar (36)izenesiq
avatar (43)centfootadoni
avatar (38)ihijudu
avatar (43)tiojusop
avatar (40)Damiennug
avatar (38)acoraxe
avatar (47)contjrat
avatar (39)axylisyb
avatar (42)tukrublape
avatar (39)iruqi
avatar (40)saitetib
avatar (34)ypasodiny
avatar (37)omapek
avatar (46)Geraldtuh
avatar (42)knigiJow
avatar (44)1stOnecal
avatar (48)Mirzojap
avatar (34)idilysaju
avatar (43)xclubDum
avatar (39)Stewartanilm
avatar (42)nikitaxople
avatar (38)GregoryRog
avatar (43)mediumog
avatar (38)odukoromu
avatar (44)Joanna4589

[-]
Online Staff
There are no staff members currently online.

>