
For non-Intel based systems please contact your system manufacturer or microprocessor vendor.Ī list of impacted products can be found here. Please check with your system vendor or equipment manufacturer for more information regarding updates for your system.

Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis.4.3 Medium CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:NĬVE-2018-3640 – Rogue System Register Read (RSRE) – also known as Variant 3a.Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.ĬVE-2018-3639 – Speculative Store Bypass (SSB) – also known as Variant 4 We worked closely with other technology companies and several operating system and system software vendors, developing an industry-wide approach to mitigate these issues promptly.įor facts about these new methods, technical resources, and steps you can take to help protect your systems and information please visit. Intel is committed to product and customer security and to coordinated disclosure. We'll have more coverage of this update, including a walkthrough of the features, soon.Security researchers identified two software analysis methods that, if used for malicious purposes, have the potential to improperly gather sensitive data from multiple types of computing devices with different vendors’ processors and operating systems.

The update is 258 MB, so it may take time to download depending on your current internet speeds.


Requires Surface Slim Pen to be paired with Surface Duo 2.
