Microsoft releases workaround for CVE-2022-0001 Specter Vulnerability

    Microsoft releases workaround for CVE-2022-0001 Specter Vulnerability

    Microsoft releases workaround for CVE-2022-0001 Specter Vulnerability


    Last Updated: 2 Weeks Ago at 14:46

     MSRC Blog:

    Released: Apr 9, 2024
    Last updated: Apr 11, 2024

    Assigning CNA:
    Intel Corporation
    CVE-2022-0001

    Impact: Information Disclosure Max Severity: Important
    Weakness: CWE-1303: Non-Transparent Sharing of Microarchitectural Resources
    CVSS Source: Intel Corporation
    CVSS: 3.1 4.7 / 4.1

    Executive Summary

    This CVE was assigned by Intel. Please see CVE-2022-0001 on CVE.org for more information.

    Exploitability

    The following table provides an exploitability assessment for this vulnerability at the time of original publication.

    Publicly disclosed Exploited Exploitability assessment
    No No Exploitation Less Likely

    FAQ

    Why is this Intel CVE included in the Security Update Guide?
    The vulnerability assigned to this CVE is in certain processor models offered by Intel and was initially disclosed March 8, 2022. Intel published updates April 9, 2024 and this CVE is being documented in the Security Update Guide to inform customers of the available mitigation and its potential performance impact. The mitigation for this vulnerability is disabled by default and manual action is required for customers to be protected.

    The following documentation was updated by Intel on April 9, 2024 and can be referenced for more information:


    What steps are required to protect my system against the vulnerability?
    We are providing the following registry information to enable the mitigations for this CVE.

    Important: This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry see How to back up and restore the registry in Windows.

    To enable the mitigation for CVE-2022-0001 on Windows devices and clients using Intel Processors:

    • Code:
      reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 0x00800000 /f
    • Code:
      reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 0x00000003 /f

    REG file for the above:

    Add: Download

    Undo: Download

    Customers who wish to implement the mitigation within their systems can also refer to the following for more information.


    To enable the mitigation for CVE-2022-0001 on Linux devices and clients using Intel Processors:


    Can I expect any performance impact after I configure the registry keys?
    In some cases, installing these updates will have a performance impact. In testing Microsoft has seen some performance impact with this mitigation. Microsoft values the security of its software and services but made the decision to allow users and administrators to evaluate the performance impact and risk exposure before deciding to enable the mitigation.


     Read more:

    https://msrc.microsoft.com/update-gu.../CVE-2022-0001
    Brink's Avatar Posted By: Brink
    14 Apr 2024


  1. Posts : 7,912
    Windows 11 Pro 64 bit
       #1

    Should we all rush to install this for Intel CPUs?
      My Computers


  2. Posts : 69,035
    64-bit Windows 11 Pro for Workstations
    Thread Starter
       #2

    Steve C said:
    Should we all rush to install this for Intel CPUs?
    Hello Steve,

    If your Intel CPU is listed as affected below, then it would be recommended to install the workaround.

    Access Denied
      My Computers


  3. Posts : 1,780
    Windows 10 Pro (+ Windows 10 Home VMs for testing)
       #3

    "Microsoft values the security of its software and services but made the decision to allow users and administrators to evaluate the performance impact and risk exposure before deciding to enable the mitigation."

    In other words, neither Microsoft nor Intel are prepared to take joint or single responsibility so... it's up to you, end-users, what you want to do about their failings to construct and implement a secure environment.

    I guess we're just easier to blame when it goes wrong.
      My Computer


  4. Posts : 7,912
    Windows 11 Pro 64 bit
       #4

    Brink said:
    Hello Steve,

    If your Intel CPU is listed as affected below, then it would be recommended to install the workaround.

    Access Denied
    My desktop PC has an Intel Core i7 13700K Raptor Lake CPU so seems to be affected. Why isn't this fix installed automatically via Windows Update if so important?
      My Computers


  5. Posts : 69,035
    64-bit Windows 11 Pro for Workstations
    Thread Starter
       #5

    Steve C said:
    My desktop PC has an Intel Core i7 13700K Raptor Lake CPU so seems to be affected. Why isn't this fix installed automatically via Windows Update if so important?
    It may get included in a future update, but no telling why it hasn't already been.
      My Computers


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 16:31.
Find Us




Windows 10 Forums