Microsoft has again released another PowerShell script after addressing the BitLocker bypass security vulnerability last month. The PowerShell scripts for automating WinRE updates got the vulnerability erased, and this time, the PowerShell scripts are for multiple different speculative execution side-channel attack CPU vulnerabilities on Windows 11 and Windows 10.
The scripts are meant to help verify the status of the mitigation of these vulnerabilities such as:
- CVE-2017-5715: branch target injection
- CVE-2017-5753: bounds check bypass
- CVE-2017-5754: rogue data cache load
- CVE-2018-3639: speculative store bypass
- CVE-2018-3620: L1 terminal fault - OS
- CVE-2018-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Load Port Data Sampling (MLPDS)
- CVE-2018-12130: Microarchitectural Fill Buffer Data Sampling (MFBDS).
The above nine vulnerabilities are covered by these security advisories, which include ADV180002, ADV180012, ADV180018, and ADV190013. Note that protection for CVE-2017-5753 (bounds check) does not require additional registry settings or firmware updates.
Also, other Memory-Mapped I/O (MMIO) vulnerabilities such as:
- CVE-2022-21123: Shared Buffer Data Read (SBDR)
- CVE-2022-21125: Shared Buffer Data Sampling (SBDS)
- CVE-2022-21127: Special Register Buffer Data Sampling Update (SRBDS Update)
- CVE-2022-21166: Device Register Partial Write (DRPW).
Drafted from Microsoft's official post, it says: “To help you verify the status of speculative execution side-channel mitigations, we published a PowerShell script (SpeculationControl) that can run on your devices”. The advisories, if implemented, will protect your system against all these vulnerabilities and get it optimised and secured.