Skip to content
security
Hatteland TechnologyJun 13, 2019 @ 13:101 min read

Potential security vulnerability / Microarchitectural Data Sampling (MDS)

A potential security vulnerability in CPUs may allow information disclosure.

Intel has released public information, please review the links below.
Microsoft has also provided information regarding security updates for a number of Operating systems.

A potential security vulnerability in CPUs may allow information disclosure. Intel is releasing Microcode Updates (MCU) updates to mitigate this potential vulnerability.


Hatteland Technology AS uses the following Windows 10 Iot Enterprise 2016 LTSB, Version 1607, 64bit (KB4494440):
• Windows 10 version 1607 for x64 based systems
• Windows Server Embedded Standard 2016 for x64 based systems
Sercurity update: https://www.catalog.update.microsoft.com/Search.aspx?q=KB4494440


Hatteland Technology AS uses the following Windows 10 Iot Enterprise 2019 LTSC, Version 1903, 64bit (KB4497936):
• Windows 10 Version 1903 for x64-based Systems
Sercurity update: https://www.catalog.update.microsoft.com/Search.aspx?q=KB4497936


Hatteland Technology AS uses the following Windows 7, 64bit (KB4499175):
• Windows 7 Professional, SP1 for x64 based systems
• Windows 7 Ultimate, SP1 for x64 based systems
• Windows Embedded Standard 7 for x64 based systems
• Windows server 2008 R2 for x64 based systems
Security update: https://www.catalog.update.microsoft.com/Search.aspx?q=KB4499175


Hatteland Technology AS uses the following Windows 8.1, 64bit (KB4499165):
• Windows Embedded 8.1 Industry Pro for x64 based systems
• Windows server 2012 R2 Standard for x64 based systems
Security update: https://www.catalog.update.microsoft.com/Search.aspx?q=KB4499165


Please review these links for more:
Click to open urlMicrocode revision guidance 
Click to open urlDFI Press release 
Click to open urlIntel MDS overview 
Click to open urlMicroarchitectural Data Sampling Advisory 
Click to open urlMicrosoft Guidance to mitigate Microarchitectural Data Sampling vulnerabilities 
Click to open urlwww.catalog.update.microsoft.com