Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Surface guidance to protect against speculative execution side-channel vulnerabilities


View products that this article applies to.

Introduction

Since January 2018, the Surface team has been publishing firmware updates for a new class of hardware vulnerabilities that involve speculative execution side channels. The Surface team has not received any information to indicate that these vulnerabilities have been used to attack customers currently, and the team continues to work closely with the Windows team and industry partners to protect customers. To get all available protection, both firmware and Windows system updates are required.

↑ Back to the top


Summary

Vulnerabilities Announced in May 2019

The Surface team is aware of new speculative execution side-channel attack variants that also affect Surface products. Mitigation of those vulnerabilities requires an operating system update and a Surface UEFI update that includes new microcode. For more information about the vulnerabilities and mitigations, see the following security advisory:

We are working together with our partners to provide updates to the following Surface products as soon as we can make sure that the updates meet our quality requirements:

In addition to the new microcode, a new UEFI setting that is known as “Simultaneous Multi-Threading (SMT)” will be available when the UEFI update is installed. This setting allows a user to disable Hyper-Threading.

Notes

  • If you decide to disable Hyper-Threading, we recommend that you use the new SMT UEFI setting.
  • Disabling SMT provides additional protection against these new vulnerabilities and the L1 Terminal Fault attack that was announced earlier. However, this method also affects the performance of the device.
  • Surface 3 and Surface Studio with Intel Core i5 do not have SMT. Therefore, those devices do not have this new setting.
  • The Microsoft Surface Enterprise Management Mode (SEMM) UEFI configurator tool version 2.43.139 or later supports the new SMT setting. The tools can be downloaded from this webpage. Download the following required tools:
    • SurfaceUEFI_Configurator_v2.43.139.0.msi
    • SurfaceUEFI_Manager_v2.43.139.0.msi

References

Vulnerability Announced in August 2018

The Surface team is aware of a new speculative execution side-channel attack called L1 Terminal Fault (L1TF) and assigned CVE-2018-3620 (OS and SMM) and CVE-2018-3646 (VMM). Affected Surface products are the same as in the “Vulnerabilities Announced in May 2018” section of this article. The microcode updates that mitigate the May 2018 findings also mitigate L1TF (CVE-2018-3646). For more information about the vulnerability and mitigations, see the following security advisory:

The security advisory proposes that customers who are using Virtualization Based Security (VBS), which includes security features such as Credential Guard and Device Guard, should consider disabling Hyper-Threading in order to fully eliminate the risk from L1TF. Customers cannot currently disable Hyper-Threading on their Surface devices. By default, VBS features are disabled on Surface devices.  The Surface team is investigating options to allow disabling Hyper-Threading.

References

Vulnerabilities Announced in May 2018

The Surface team has become aware of new speculative execution side-channel attack variants that also affect Surface products. Mitigation of those vulnerabilities requires UEFI updates that use new microcode. For more information about the vulnerabilities and mitigations, see the following security advisories:

We are working together with our partners to provide updates to the following Surface products as soon as we can make sure that the updates meet our quality requirements:

References

Vulnerabilities Announced in January 2018

The Surface team is aware of the publicly disclosed class of vulnerabilities that involve speculative execution side channels (known as Spectre and Meltdown) that affect many modern processors and operating systems, including Intel, AMD, and ARM. For more information about the vulnerabilities and mitigations, see the following security advisory:

Microsoft Security Advisory ADV180002

For more information about Windows software updates, see the following Knowledge Base articles:

  • 4073757 Protect your Windows devices against Spectre and Meltdown vulnerabilities
  • 4073119 Windows Client Guidance for IT Pros to protect against speculative execution side-channel vulnerabilities

In addition to installing the January 3 Windows Operating System Security Updates, Surface has released UEFI updates through Windows Update and the Download Center for the following devices:

These updates are available for devices that are running Windows 10 Creators Update (build 15063) and later versions.

References

↑ Back to the top


More information

Surface hub has implemented defense-in-depth strategies. For more information, see the following topic on the Windows IT Pro Center website:

Differences between Surface Hub and Windows 10 Enterprise

Because of this, we believe that exploits that use these vulnerabilities are significantly reduced on Surface Hub.

The Surface team is focused on making sure that our users have a secure and reliable experience. We will continue to monitor and update devices as required to address these vulnerabilities and keep the devices reliable and secure.

↑ Back to the top


Keywords: kbsecvulnerability, spectre, meltdown, kb, kbsurveynew, kbsecurity, kbbug, kbsecbulletin, kbmustloc, kblangall, kbfix, kbexpertiseinter, Known issues, kbsecreview

↑ Back to the top

Article Info
Article ID : 4073065
Revision : 115
Created on : 7/31/2019
Published on : 8/1/2019
Exists online : False
Views : 379