Intel recently released a new mitigation for Spectre and Meltdown and some of their variants. Called Retpoline, it might not be enabled with the Windows 10 1809 update. Here's how to find out and implement. Credit: Matejmo / Getty Images The Spectre and Meltdown vulnerabilities discovered in January 2018 showed that weaknesses in CPUs were a potential attack vector. They allow a rogue process to read memory without authorization. Patches were rolled out along with bios updates from the manufacturer, but they came with a costly side effect: They degraded performance, especially on systems with older CPUs. Microsoft enabled the protections by default on workstations, but not on server platforms.Intel came up with a new methodology called “Retpoline.” The mitigation technique “is resistant to exploitation and has attractive performance properties compared to other mitigations.” In the May 14, 2019 (and later) updates for Windows 10 1809 and Server 2019 (and newer), Retpoline is enabled by default on supported devices. As Microsoft notes, if the following conditions are met, then the new, less impactful performance patching is enabled:Spectre, variant 2 (CVE-2017-5715) mitigation is enabled.For client SKUs, Spectre variant 2 mitigation is enabled by default.For server SKUs, Spectre variant 2 mitigation is disabled by default. To realize the benefits of Retpoline, admins can enable it on servers following this guidance.Supported microcode/firmware updates are applied to the machine.Windows patches alone won’t enable these new protections. You must also have the necessary firmware from the OEM manufacturer.Windows update mitigates MDS attacksAlso mitigated in the May updates is a new security vulnerability called microarchitectural data sampling (MDS). These vulnerabilities impact only Intel CPUs and allow attackers to eavesdrop on the information that the chip passes to other components. Attackers can exploit MDS to get around the security boundaries set by virtual machine hypervisors, OS kernels, and SGX enclaves. The CVE numbers assigned to these vulnerabilities include: CVE-2018-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)CVE-2018-12130: Microarchitectural Load Port Data Sampling (MLPDS)Once again, the protections for MDS come from a combination of operating system and firmware updates. You may need to determine if Intel has released a firmware update for your CPU. For systems with older processors that can’t receive protect, determine if these machines need to be processing any sensitive information.Then you will need to decide if you will enable protections. Due to performance hits, Microsoft has enabled the protection on workstations by default, but left the decision up to you on server platforms. To enable these protections (or disable them) on workstations, follow the guidance provided by Microsoft in KB4073119. To enable these protections on Windows Server platforms, follow the guidance in KB4072698. You may need to review various tech sites as to the tested performance hits after the patches have been installed. Once you’ve installed the updates, download the updated PowerShell module that allows you to confirm you are protected. Download the updated PowerShell module as noted in the instructions from the PowerShellGallery. If you have previously installed the PowerShell module, you need to use the command Install-Module -Name SpeculationControl -Force to update the PowerShell module. Susan BradleyPowerShell module for testing for speculation control protectionsOnce you’ve installed the module, follow the guidance from Github. Run the command Get-SpeculationControlSettings to confirm your system is protected. In my sample case, I clearly need to enable the protections via the registry: Susan BradleyPowerShell report on protectionsScroll down to the bottom of the report for the recap of what protections are and are not enabled. Susan BradleyRecap of protectionsMake the following registry settings to enable these MDS protections: (CVE-2018-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130. You can also use these settings for Spectre (CVE-2017-5753 and CVE-2017-5715), Meltdown (CVE-2017-5754), and variants including Speculative Store Bypass Disable (SSBD) (CVE-2018-3639) and L1 Terminal Fault (L1TF) (CVE-2018-3615, CVE-2018-3620 and CVE-2018-3646) without disabling hyper-threading:reg add "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management" /v FeatureSettingsOverride /t REG_DWORD /d 72 /freg add "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 3 /f If the Hyper-V feature is installed, add the following registry setting:reg add "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionVirtualization" /v MinVmVersionForCpuBasedMitigations /t REG_SZ /d "1.0" /fIf the system is a Hyper-V host and the firmware updates have been applied, fully shut down all virtual machines. This enables the firmware-related mitigation to be applied on the host before the VMs are started. Therefore, the VMs are also updated when they’re restarted. Restart the computer for the changes to take effect.To enable mitigations with hyber-threading disabled for MDS (CVE-2018-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130), Spectre (CVE-2017-5753 and CVE-2017-5715), Meltdown (CVE-2017-5754), and variants including SSBD (CVE-2018-3639) and L1TF (CVE-2018-3615, CVE-2018-3620 and CVE-2018-3646): reg add "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management" /v FeatureSettingsOverride /t REG_DWORD /d 8264 /freg add "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 3 /fIf the Hyper-V feature is installed, add the following registry setting:reg add "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionVirtualization" /v MinVmVersionForCpuBasedMitigations /t REG_SZ /d "1.0" /fIf this is a Hyper-V host and the firmware updates have been applied, fully shut down all VMs. This enables the firmware-related mitigation to be applied on the host before the VMs are started. The VMs are also updated when they’re restarted. Restart the computer for the changes to take effect.To disable mitigations for MDS (CVE-2018-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130), Spectre (CVE-2017-5753 and CVE-2017-5715), Meltdown (CVE-2017-5754), and variants including SSBD (CVE-2018-3639) and L1TF (CVE-2018-3615, CVE-2018-3620, and CVE-2018-3646):reg add "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management" /v FeatureSettingsOverride /t REG_DWORD /d 3 /freg add "HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerMemory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 3 /fRestart the computer for the changes to take effect.Bottom line: Review your systems. Determine if you are at high risk for these types of silent attacks and take action to protect your systems from these silent attackers. Related content news Is China waging a cyber war with Taiwan? Nation-state hacking groups based in China have sharply ramped up cyberattacks against Taiwan this year, according to multiple reports. By Gagandeep Kaur Dec 01, 2023 4 mins Cyberattacks Government news Apple patches info-stealing, zero day bugs in iPads and Macs The vulnerabilities that can allow the leaking of sensitive information and enable arbitrary code execution have had exploitations in the wild. By Shweta Sharma Dec 01, 2023 3 mins Zero-day vulnerability feature The CSO guide to top security conferences Tracking postponements, cancellations, and conferences gone virtual — CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you. By CSO Staff Dec 01, 2023 6 mins Technology Industry IT Skills Events news Conti-linked ransomware takes in $107 million in ransoms: Report A ransomware campaign linked to the ostensibly defunct Conti malware group has targeted mostly US businesses, in a costly series of attacks. By Jon Gold Nov 30, 2023 4 mins Ransomware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe