Τον περασμένο μήνα η Microsoft κυκλοφόρησε PowerShell scripts για την automation of WinRE updates in addressing a BitLocker vulnerability. Similarly, the company has released PowerShell scripts again, but this time, it fixes multiple vulnerabilities for CPU side-channel attacks in Windows 11 and Windows 10.

For example, one of them fixes the memory mapped IO (MMIO) flaw. The scripts are intended to help verify the mitigation status of these security vulnerabilities.
Microsoft states:
To help you verify the status of side-channel mitigations, we've published PowerShell scripts (SpeculationControl) that can be run on your devices. This article explains how to run the SpeculationControl scripts and what the response you get from .PowerShell means
Safety tips ADV180002, ADV180012, ADV180018And ADV190013 cover the following nine vulnerabilities:
- CVE-2017-5715 (branch target injection)
- CVE-2017-5753 (bounds check bypass)
Footnotes Protection for CVE-2017-5753 (bounds check) does not require additional registry settings or firmware updates. - CVE-2017-5754 (rogue data cache load)
- CVE-2018-3639 (speculative store bypass)
- CVE-2018-3620 (L1 terminal fault – OS)
- CVE-2018-11091 (Microarchitectural Data Sampling Uncacheable Memory (MDSUM))
- CVE-2018-12126 (Microarchitectural Store Buffer Data Sampling (MSBDS))
- CVE-2018-12127 (Microarchitectural Load Port Data Sampling (MLPDS))
- CVE-2018-12130 (Microarchitectural Fill Buffer Data Sampling (MFBDS))
Η ADV220002 covers additional vulnerabilities related to Memory-Mapped I/O (MMIO):
- CVE-2022-21123 – Shared Buffer Data Read (SBDR)
- CVE-2022-21125 – Shared Buffer Data Sampling (SBDS)
- CVE-2022-21127 – Special Register Buffer Data Sampling Update (SRBDS Update)
- CVE-2022-21166 – Device Register Partial Write (DRPW)
You can find the PowerShell scripts and more details in the official Microsoft support document KB4074629.
