Reply to Message

Reply to Message

View discussion in a popup

Replying to:
harmandeep
1 Copper

Re: Dell inspiron 14R 5420 - BIOS - Spectre - SideChannel

Hi,

My processor is part of Intel 3rd Gen Core family (3612QM | Ivy Bridge) and its affected by Spectre Side Channel attacks, see Intel Advisory article. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html

Microsoft has released a powershell cmdlet to see the status of these vulnerabilties (whether hardware level mitigations are present or not). https://support.microsoft.com/en-in/help/4074629/understanding-the-output-of-get-speculationcontrols...

I am attaching output of the relevant powershell command below, which shows that my System (DELL 14R 5420 | BIOS A19) is affected by these attacks and that Hardware level updates/mitigations/microcode updates are not present.

BTIHardwarePresent and SSBDHardwarePresent flags in the output shows that Hardware level mitigations are not  present.

Can you please pass on this feedback to respective team so that BIOS can be updated and released for Dell Inpiron 14R 5420.

PS C:\WINDOWS\system32> Get-SpeculationControlSettings
For more information about the output below, please refer to https://support.microsoft.com/en-in/help/4074629

Speculation control settings for CVE-2017-5715 [branch target injection]

Hardware support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is enabled: True

Speculation control settings for CVE-2017-5754 [rogue data cache load]

Hardware requires kernel VA shadowing: True
Windows OS support for kernel VA shadow is present: True
Windows OS support for kernel VA shadow is enabled: True
Windows OS support for PCID performance optimization is enabled: False [not required for security]

Speculation control settings for CVE-2018-3639 [speculative store bypass]

Hardware is vulnerable to speculative store bypass: True
Hardware support for speculative store bypass disable is present: False
Windows OS support for speculative store bypass disable is present: True
Windows OS support for speculative store bypass disable is enabled system-wide: False

Speculation control settings for CVE-2018-3620 [L1 terminal fault]

Hardware is vulnerable to L1 terminal fault: True
Windows OS support for L1 terminal fault mitigation is present: True
Windows OS support for L1 terminal fault mitigation is enabled: True


BTIHardwarePresent : True
BTIWindowsSupportPresent : True
BTIWindowsSupportEnabled : True
BTIDisabledBySystemPolicy : False
BTIDisabledByNoHardwareSupport : False
BTIKernelRetpolineEnabled : False
BTIKernelImportOptimizationEnabled : False
KVAShadowRequired : True
KVAShadowWindowsSupportPresent : True
KVAShadowWindowsSupportEnabled : True
KVAShadowPcidEnabled : False
SSBDWindowsSupportPresent : True
SSBDHardwareVulnerable : True
SSBDHardwarePresent : False
SSBDWindowsSupportEnabledSystemWide : False
L1TFHardwareVulnerable : True
L1TFWindowsSupportPresent : True
L1TFWindowsSupportEnabled : True
L1TFInvalidPteBit : 45
L1DFlushSupported : False

0 Kudos