I tried it and it works.
Asrock Extreme7+, CPU Skylake-S, Windows 10 1709.16299.248
InSpectre
BEFORE
Meltdown protected: YES Spectre protected : NO
AFTER
Meltdown protected: YES Spectre protected : YES
Powershell SpeculationControl.psm1
BEFORE
Speculation control settings for CVE-2017-5715 [branch target injection] For more information about the output below, please refer to https://support.microsoft.com/en-in/help/4074629" rel="nofollow - https://support.microsoft.com/en-in/help/4074629
Hardware support for branch target injection mitigation is present: False Windows OS support for branch target injection mitigation is present: True Windows OS support for branch target injection mitigation is enabled: False Windows OS support for branch target injection mitigation is disabled by system policy: False Windows OS support for branch target injection mitigation is disabled by absence of hardware support: True
Speculation control settings for CVE-2017-5754 [rogue data cache load]
Hardware requires kernel VA shadowing: True Windows OS support for kernel VA shadow is present: True Windows OS support for kernel VA shadow is enabled: True Windows OS support for PCID performance optimization is enabled: True [not required for security]
Suggested actions
* Install BIOS/firmware update provided by your device OEM that enables hardware support for the branch target injection mitigation.
BTIHardwarePresent : False BTIWindowsSupportPresent : True BTIWindowsSupportEnabled : False BTIDisabledBySystemPolicy : False BTIDisabledByNoHardwareSupport : True KVAShadowRequired : True KVAShadowWindowsSupportPresent : True KVAShadowWindowsSupportEnabled : True KVAShadowPcidEnabled : True
AFTER
Speculation control settings for CVE-2017-5715 [branch target injection] For more information about the output below, please refer to https://support.microsoft.com/en-in/help/4074629" rel="nofollow - https://support.microsoft.com/en-in/help/4074629
Hardware support for branch target injection mitigation is present: True Windows OS support for branch target injection mitigation is present: True Windows OS support for branch target injection mitigation is enabled: True
Speculation control settings for CVE-2017-5754 [rogue data cache load]
Hardware requires kernel VA shadowing: True Windows OS support for kernel VA shadow is present: True Windows OS support for kernel VA shadow is enabled: True Windows OS support for PCID performance optimization is enabled: True [not required for security]
BTIHardwarePresent : True BTIWindowsSupportPresent : True BTIWindowsSupportEnabled : True BTIDisabledBySystemPolicy : False BTIDisabledByNoHardwareSupport : False KVAShadowRequired : True KVAShadowWindowsSupportPresent : True KVAShadowWindowsSupportEnabled : True KVAShadowPcidEnabled : True
This actually is a Windows update which updates Windows file C:\Windows\System32\mcupdate_GenuineIntel.dll for Intel CPU, or eventually mcupdate_AuthenticAMD.dll for AMD CPU.
The update KB4090007 can be uninstalled. I do not see any side effects yet.
Check value "Update Revision" before and after in registry key:
[HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor]
In Windows is Intel Microcode Update Revision changed to C2 now.
|