This could imply that the 0xf4 is a fix for these vulnerabilities! Cause the CPUs that didn’t get it are not vulnerable.
On the other hand, The CPUs with 0xf0 are vulnerable to “Return Stack Buffer Underflow (RSBU) RSB Alternate Behavior (RSBA) CVE-2022-29901 INTEL-SA-00702” menthioned in the 3rd column!
These are always exceptions “406E3 and 906EC”
806EC: 0xf4 SO NA NA SO MCU+SO MCU+SO SO SO SO NA NA
906ED: 0xf4 SO NA NA SO MCU+SO MCU+SO SO SO SO NA NA
A0652: 0xf4 SO NA NA SO MCU+SO MCU+SO SO SO SO NA NA
A0653: 0xf4 SO NA NA SO MCU+SO MCU+SO SO SO SO NA NA
A0655: 0xf4 SO NA NA SO MCU+SO MCU+SO SO SO SO NA NA
A0661: 0xf4 SO NA NA SO MCU+SO MCU+SO SO SO SO NA NA
506E3: 0xf0 NA NA SO NA MCU+SO MCU+SO SO NA NA NA NA
806E9: 0xf0 NA NA SO NA MCU+SO MCU+SO SO NA NA NA NA
806EA: 0xf0 NA NA SO NA MCU+SO MCU+SO SO NA NA NA NA
806EB: 0xf0 NA NA SO NA MCU+SO MCU+SO SO NA NA NA NA
906E9: 0xf0 NA NA SO NA MCU+SO MCU+SO SO NA NA NA NA
906EA: 0xf0 NA NA SO NA MCU+SO MCU+SO SO NA NA NA NA
906EB: 0xf0 NA NA SO NA MCU+SO MCU+SO SO NA NA NA NA
406E3: 0xf0 NA NA SO NA MCU+SO MCU+SO NA NA NA NA NA
906EC: 0xf0 SO NA SO NA MCU+SO MCU+SO SO NA NA NA NA
I could be wrong, I don’t know. But it seems like it.
Upon today release of the KB5019178 and having mcupdate_GenuineIntel.dll as 22621.1341 (bios mcode not related here because its not updated or mod), just noticed that system (22621.1391) is still using (cpuidA0653) the F0 mcode and not the F4 as reported to be used in this KB for using the F4 from 2022/07/31… whats the deal here in this package… feedback is appreciated.
Intel Platform Update (IPU) 2022.1 that is dated June 2022 contains fixes for security vulnerabilities including Memory-Mapped I/O (MMIO) Side-Channel Attack.
Look for A0653 => shows F4 but 2022.3 (and F4 is dated 07/31/2022)
Powershell output for latest? module SpeculationControl with F4 (W10 22H2) - unclear if there's a difference between F0 and F4
Speculation control settings for CVE-2017-5715 [branch target injection]
Hardware support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is present: True
Windows OS support for branch target injection mitigation is enabled: True
Speculation control settings for CVE-2017-5754 [rogue data cache load]
Hardware requires kernel VA shadowing: True
Windows OS support for kernel VA shadow is present: True
Windows OS support for kernel VA shadow is enabled: True
Windows OS support for PCID performance optimization is enabled: True [not required for security]
Speculation control settings for CVE-2018-3639 [speculative store bypass]
Hardware is vulnerable to speculative store bypass: True
Hardware support for speculative store bypass disable is present: True
Windows OS support for speculative store bypass disable is present: True
Windows OS support for speculative store bypass disable is enabled system-wide: True
Speculation control settings for CVE-2018-3620 [L1 terminal fault]
Hardware is vulnerable to L1 terminal fault: False
Speculation control settings for MDS [microarchitectural data sampling]
Windows OS support for MDS mitigation is present: True
Hardware is vulnerable to MDS: False
Speculation control settings for SBDR [shared buffers data read]
Windows OS support for SBDR mitigation is present: True
Hardware is vulnerable to SBDR: True
Windows OS support for SBDR mitigation is enabled: True
Speculation control settings for FBSDP [fill buffer stale data propagator]
Windows OS support for FBSDP mitigation is present: True
Hardware is vulnerable to FBSDP: True
Windows OS support for FBSDP mitigation is enabled: True
Speculation control settings for PSDP [primary stale data propagator]
Windows OS support for PSDP mitigation is present: True
Hardware is vulnerable to PSDP: True
Windows OS support for PSDP mitigation is enabled: True
Yes my friend powershell and all the stuff that we know around, reports F0…
The idea that the KB give us is that the F4 would be added to the sys by this update…seems not, thats what im trying to figure out.
Indeed we know this F4 already from individual mcodes, just thought that now MS was adding it to mcupdate…
To my recollection, Microsoft never released a microcode update package that included the latest of anything. I guess they have their own verification procedure. This is partly contradicted by the fact that in the past, the Insider Preview (Dev channel) versions were the ones that had the latest microcode versions. The current Windows 11 update is dated 23 February 2023 , and the latest microcode included is dated February 2022.
Sure…but dont want the trouble, you see this a Z490 from MSI without USB BFB and i got lucky so far in all bios updates without any issues that others still report today, windows is using the same mcode as the bios, the F0… so let it be as it is, not gonna play with her bios and update the mcode.
Never checked the old mcupdate file, but now this one (22621.1341) is on F0, if so they just updated from E0 to F0 and the F4 maybe in by 2024/25…lol
And thank you for all the info you gathered.