Intel recently announced that they have completed software validations and have started to release new microcode for current CPU platforms in reaction to the following threats:
- Spectre Variant 3a (CVE-2018-3640: "Rogue System Register Read (RSRE)")
- Spectre Variant 4 (CVE-2018-3639: "Speculative Store Bypass (SSB)")
- L1TF (CVE-2018-3620, CVE-2018-3646: "L1 Terminal Fault")
This new release includes a microcode update from Intel for the following CPUs.
Important Install this update for the listed processors only.
|Code Name||Product Collection||Product Names||CPUID||Intel microcode update revision|
|Skylake U23e||6th Generation Intel® Core™ Processor Family||Intel® Core™ Processor I7-6560U, I7-6567U, I7-6650U, I7-6660U Intel® Core™ Processor I5-6260U, I5-6267U, I5-6287U, I5-6360U Intel® Core™ Processor I3-6167U||406E3||0xC6|
|Skylake U||6th Generation Intel® Core™ Processors||Intel® Core™ Processor i7-6500U, i7-6510U, i7-6600U Intel® Core™ Processor i5-6200U, i5-6210U, i5-6300U, i5-6310U Intel® Core™ Processor i3-6100U, i3-6110U Intel® Pentium® Processor 4405U, 4415U Intel® Celeron® Processor 3855U, 3865U, 3955U, 3965U||406E3||0xC6|
|Skylake Y||6th Generation Intel® Core™ Processor Family||Intel® Core™ Processor m7-6Y75 Intel® Core™ Processor m5-6Y54, m5-6Y57 Intel® Core™ Processor m3-6Y30 Intel® Pentium® Processor 4405Y||406E3||0xC6|
|Skylake H||6th Generation Intel® Core™ Processor Family||Intel® Core™ Processor i7-6700HQ, i7-6770HQ, i7-6820HK, i7-6820HQ, i7-6870HQ, i7-6920HQ, i7-6970HQ Intel® Core™ Processor i5-6300HQ, i5-6350HQ, i5-6440HQ Intel® Core™ Processor i3-6100H||506E3||0xC6|
|Skylake S||6th Generation Intel® Core™ Processor Family||Intel® Core™ Processor i7-6700, i7-6700K, i7-6700T Intel® Core™ Processor i5-6400, i5-6400T, i5-6500, i5-6500T , i5-6600, i5-6600K, i5-6600T Intel® Core™ Processor i3-6100, i3-6100T, i3-6120, i3-6120T, i3-6300, i3-6300T, i3-6320, i3-6320T Intel® Pentium® Processor G4400, G4400T, G4420, G4420T, G4500, G4500T, G4520, G4520T, G4540 Intel® Celeron® Processor G3900, G3900T, G3920, G3920T, G3940||506E3||0xC6|
This update is a standalone update that is targeted for Windows 10 Release To Market (RTM). This update also includes Intel microcode updates that were already released for these operating systems at the time of release to manufacturing (RTM). We will offer additional microcode updates from Intel through this article for these operating systems as they become available to Microsoft. By default, this mitigation is turned off for Spectre Variant 4 (CVE-2018-3639: "Speculative Store Bypass (SSB)"). Please make sure that mitigation against Spectre Variant 4 (CVE-2018-3639: "Speculative Store Bypass (SSB)") is enabled for Windows client through the registry settings that are documented in the following article:
- Windows client guidance for IT Pros to protect against speculative execution side-channel vulnerabilities
Consult with your device manufacturer and Intel through their websites regarding their microcode recommendation for your device before you apply this update to your device.
Microsoft is not aware of any issues that affect this update currently.