Spectre Variant 2 updates engendered by AMD and Microsoft


Spectre Variant 2 updates engendered by AMD and Microsoft

Although AMD is one of the leading organizations in microprocessors industry, it was faced by a vicious CPU flaw called Spectre and Meltdown.  Despite the fact that AMD processors are not vulnerable to the attacks of Meltdown, they are vulnerable to Spectre and Spectre Variant 2, (CVE-2017-5753) and (CVE-2017-5715) respectively. However, AMD sneaked out of this danger zone present by Spectre Variant 2 by implementing a microcode update to its own equipment to prevent attacks on Windows 10.

Spectre Variant 2 updates engendered by AMD and MicrosoftToday, AMD is providing updates regarding our recommended mitigations for Google Project Zero (GPZ) Variant 2 (Spectre) for Microsoft Windows users. These mitigations require a combination of processor microcode updates from our OEM and motherboard partners, as well as running the current and fully up-to-date version of Windows.

The urge of updating Windows 10 with KB4093112

Google Project Zero’s staff was able to force an impulsive attack on many organizations by Spectre and Meltdown striking Intel and AMD. A lot of effort was spent on trials to kill these vulnerabilities till they were able to defend their systems.

Dodging out of CPU flaws through Microsoft updates is not a simple matter as microcode updates are made by OEM and PC chipmakers. The release of these updates are made after OEM tests them and upon their recommendation for usage. Accordingly, the users should be alert to all of the new  updates regarding Spectre and Meltdown by turning on the automatic updates.

The process of patching Spectre and Meltdown is made up of two steps:

  • Install all the updates for OS and apply firmware updates to chipsets.
  • Download KB4093112 via the automatic update.

To make sure that you are coping with all of the new updates issued regularly.

AMD’s claim regarding Spectre Variant 2 utilization

According to AMD’s perspective, it is difficult for hackers to overcome the lowered vulnerability made by AMD using IBPB, but it is  not impossible

While we believe it is difficult to exploit Variant 2 on AMD processors, we actively worked with our customers and partners to deploy [a] combination of operating system patches and microcode updates for AMD processors to further mitigate the risk.

In addition, AMD is capable of reading the minds of the hackers and does its best to dodge these attacks. Many professionals also believe that the developers of Spectre Variant 2 are not capable of surpassing these updates.

Related Article: Yes, the Blockchain Can Be Hacked