Microsoft Releases Patches for the Intel Processor MMIO Stale Data Vulnerabilities in June 2022 Patch Tuesday

Microsoft has covered the memory-mapped I/O vulnerabilities known as Processor MMIO Stale Data Vulnerabilities that was published by Intel on June 14, 2022.
  
These vulnerabilities are: 

 
A successful exploit of these flaws could allow an attacker to read privileged data across trust boundaries. These flaws could allow a virtual machine to improperly access information from another in shared resource environments such as some cloud service configurations. To exploit these vulnerabilities in non-browsing circumstances on standalone computers, an attacker would need prior access to the computer or the ability to run a specially built application on the target system. 

Important: These vulnerabilities might affect other operating systems and service providers. We advise customers to seek guidance from their respective vendors. 
  
Microsoft has published software patches to address these vulnerabilities. Firmware (microcode) and software updates are necessary to obtain fully available protection. Installing these updates may have a performance impact in some circumstances. 
 
CVE-2022-21123 – Shared Buffer Data Read (SBDR) 
Incomplete cleanup of multi-core shared buffers for some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access. 
 
CVE-2022-21125 – Shared Buffer Data Sampling (SBDS) 
Incomplete cleanup of microarchitectural fill buffers on some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access. 
 
CVE-2022-21127 – Special Register Buffer Data Sampling Update (SRBDS Update) 
Incomplete cleanup in the specific special register read operations for some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access. 
  
CVE-2022-21166 – Device Register Partial Write (DRPW) 
Incomplete cleanup in specific special register writes operations for some Intel® Processors may allow an authenticated user to potentially enable information disclosure via local access. 
 
Visit the Microsoft Guidance on Intel Processor MMIO Stale Data Vulnerabilities (ADV220002) page to access the full description of each vulnerability and the systems that it affects. 
 
Qualys customers can scan their network with QID 91917 to detect vulnerable assets. 
 
Please continue to follow Qualys Threat Protection for more coverage on the latest vulnerabilities. 
 
References: 
https://msrc.microsoft.com/update-guide/releaseNote/2022-Jun 
https://msrc.microsoft.com/update-guide/vulnerability/ADV220002 
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00615.html  

Leave a Reply

Your email address will not be published. Required fields are marked *