Security Updates for Windows 10 / Windows Server 2016 / Windows Server 2019 (March 2019) (Spectre) (Meltdown) (Foreshadow)

Medium Nessus Plugin ID 122975

Synopsis

The remote Windows host is missing a microcode update.

Description

The remote Windows host is missing a security update. It is, therefore, missing microcode updates to address the following vulnerabilities:

- Spectre Variant 3a (CVE-2018-3640: Rogue System Register Read (RSRE)).

- Spectre Variant 4 (CVE-2018-3639: Speculative Store Bypass (SSB))

- L1TF (CVE-2018-3620, CVE-2018-3646: L1 Terminal Fault)

Note that Nessus did not actually test for these flaws nor checked the target processor architecture but instead, has relied on the version of mcupdate_GenuineIntel.dll to be latest for supported Windows release.

Solution

Microsoft has released security updates for Windows 10, Windows Server 2016 and Server 2019.

See Also

http://www.nessus.org/u?6b54af4a

http://www.nessus.org/u?2d0e32dc

http://www.nessus.org/u?91f9cc84

http://www.nessus.org/u?236ac8ce

http://www.nessus.org/u?bcc8c14e

http://www.nessus.org/u?826f213e

Plugin Details

Severity: Medium

ID: 122975

File Name: smb_nt_ms19_mar_oob_microcode.nasl

Version: 1.3

Type: local

Agent: windows

Published: 2019/03/20

Updated: 2019/05/21

Dependencies: 13855, 93962, 57033

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2018-3639

CVSS v2.0

Base Score: 4.9

Temporal Score: 3.8

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 5.5

Temporal Score: 5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows

Required KB Items: SMB/MS_Bulletin_Checks/Possible, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2019/03/18

Vulnerability Publication Date: 2018/05/22

Reference Information

CVE: CVE-2018-3640, CVE-2018-3639, CVE-2018-3620, CVE-2018-3646

BID: 104228, 104232, 105080

MSKB: 4465065, 4346084, 4346085, 4346086, 4346087, 4346088

MSFT: MS19-4465065, MS19-4346084, MS19-4346085, MS19-4346086, MS19-4346087, MS19-4346088