Security Updates for Windows 10 / Windows Server 2016 / Windows Server 2019 (March 2019) (Spectre) (Meltdown) (Foreshadow)

medium Nessus Plugin ID 122975

Synopsis

The remote Windows host is missing a microcode update.

Description

The remote Windows host is missing a security update. It is, therefore, missing microcode updates to address the following vulnerabilities:

- Spectre Variant 3a (CVE-2018-3640: Rogue System Register Read (RSRE)).

- Spectre Variant 4 (CVE-2018-3639: Speculative Store Bypass (SSB))

- L1TF (CVE-2018-3620, CVE-2018-3646: L1 Terminal Fault)

Note that Nessus did not actually test for these flaws nor checked the target processor architecture but instead, has relied on the version of mcupdate_GenuineIntel.dll to be latest for supported Windows release.

Solution

Microsoft has released security updates for Windows 10, Windows Server 2016 and Server 2019.

See Also

http://www.nessus.org/u?6b54af4a

http://www.nessus.org/u?2d0e32dc

http://www.nessus.org/u?91f9cc84

http://www.nessus.org/u?236ac8ce

http://www.nessus.org/u?bcc8c14e

http://www.nessus.org/u?826f213e

http://www.nessus.org/u?8c467280

Plugin Details

Severity: Medium

ID: 122975

File Name: smb_nt_ms19_mar_oob_microcode.nasl

Version: 1.7

Type: local

Agent: windows

Published: 3/20/2019

Updated: 6/17/2024

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 4.7

Temporal Score: 3.7

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2018-3646

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.1

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows_server_2016, cpe:/o:microsoft:windows_server_2019

Required KB Items: Settings/ParanoidReport, SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/18/2019

Vulnerability Publication Date: 5/22/2018

Reference Information

CVE: CVE-2018-3620, CVE-2018-3639, CVE-2018-3640, CVE-2018-3646

BID: 104228, 104232, 105080

MSFT: MS19-4346084, MS19-4346085, MS19-4346086, MS19-4346087, MS19-4346088, MS19-4465065

MSKB: 4346084, 4346085, 4346086, 4346087, 4346088, 4465065