07-24-2019, 03:07 PM
07-26-2019, 01:00 PM
(07-24-2019, 03:07 PM)DeathBringer Wrote: [ -> ]Where's dump for 1.30 version?
this is full dump of bios 1.30 version:
https://www.sendspace.com/file/x5mw5i
07-26-2019, 01:36 PM
Try to flash this mod.
07-26-2019, 01:47 PM
07-27-2019, 04:08 AM
07-27-2019, 04:25 AM
(07-27-2019, 04:08 AM)Laurentiu Wrote: [ -> ]inspectre say that computer îs still vulnerableShow a screenshot.
07-27-2019, 05:46 AM
here are the screenshots[attachment=17128][attachment=17129]
i found this: https://www.intel.com/content/dam/www/pu...132019.pdf
i found this: https://www.intel.com/content/dam/www/pu...132019.pdf
07-27-2019, 06:00 AM
OK. I see.
Show results of Get-SpeculationControlSettings - https://support.microsoft.com/en-gb/help...powershell
Show results of Get-SpeculationControlSettings - https://support.microsoft.com/en-gb/help...powershell
07-27-2019, 08:19 AM
(07-27-2019, 06:00 AM)DeathBringer Wrote: [ -> ]OK. I see.
Show results of Get-SpeculationControlSettings - https://support.microsoft.com/en-gb/help...powershell
here is:
PS C:\Users\Gabriel> Get-SpeculationControlSettings
For more information about the output below, please refer to https://support.microsoft.com/help/4074629
Speculation control settings for CVE-2017-5715 [branch target injection]
Hardware support for branch target injection mitigation is present: False
Windows OS support for branch target injection mitigation is present: False
Windows OS support for branch target injection mitigation is enabled: False
Speculation control settings for CVE-2017-5754 [rogue data cache load]
Hardware requires kernel VA shadowing: True
Windows OS support for kernel VA shadow is present: False
Windows OS support for kernel VA shadow is enabled: False
Speculation control settings for CVE-2018-3639 [speculative store bypass]
Windows OS support for speculative store bypass disable is present: False
Speculation control settings for CVE-2018-3620 [L1 terminal fault]
Hardware is vulnerable to L1 terminal fault: True
Windows OS support for L1 terminal fault mitigation is present: False
Windows OS support for L1 terminal fault mitigation is enabled: False
Speculation control settings for MDS [microarchitectural data sampling]
Windows OS support for MDS mitigation is present: False
Suggested actions
* Install BIOS/firmware update provided by your device OEM that enables hardware support for the branch target injectio
n mitigation.
* Install the latest available updates for Windows with support for speculation control mitigations.
* Follow the guidance for enabling Windows Client support for speculation control mitigations described in https://supp
ort.microsoft.com/help/4073119
BTIHardwarePresent : False
BTIWindowsSupportPresent : False
BTIWindowsSupportEnabled : False
BTIDisabledBySystemPolicy : False
BTIDisabledByNoHardwareSupport : False
BTIKernelRetpolineEnabled :
BTIKernelImportOptimizationEnabled :
KVAShadowRequired : True
KVAShadowWindowsSupportPresent : False
KVAShadowWindowsSupportEnabled : False
KVAShadowPcidEnabled : False
SSBDWindowsSupportPresent : False
SSBDHardwareVulnerable :
SSBDHardwarePresent : False
SSBDWindowsSupportEnabledSystemWide : False
L1TFHardwareVulnerable : True
L1TFWindowsSupportPresent : False
L1TFWindowsSupportEnabled : False
L1TFInvalidPteBit :
L1DFlushSupported : False
MDSWindowsSupportPresent : False
07-27-2019, 09:14 AM
Wait for new release of suitable microcode by Intel...