Intel microcode updates
Most recent vulnerability
KB number and description |
Windows version |
Source |
---|---|---|
Windows 11, Windows 10, Windows 8.1, Windows Server 2022, Windows Server 2019, Windows Server 2016 |
Refer to OEM / Intel Firmware release of Microcode which needs to be updated for mitigation |
Past vulnerabilities
Microsoft is making available Intel-validated microcode updates that are related to Spectre Variant 2 (CVE-2017-5715 | Branch Target Injection).
The following table lists specific Microsoft Knowledge Base articles by Windows version. These articles contain links to the available Intel microcode updates by CPU:
KB Number and Description |
Windows Version |
Source |
Windows 10, version 1803, and Windows Server, version 1803 |
Windows Update, Windows Server Update Service, and Microsoft Update Catalog |
|
Windows 10, version 1709, and Windows Server 2016, version 1709 |
Windows Update, Windows Server Update Service, and Microsoft Update Catalog |
|
Windows 10, version 1703 |
Windows Update, Windows Server Update Service, and Microsoft Update Catalog |
|
Windows 10, version 1607, and Windows Server 2016 |
Windows Update, Windows Server Update Service, and Microsoft Update Catalog |
|
Windows 10 (RTM) |
Windows Update, Windows Server Update Service, and Microsoft Update Catalog |
Microsoft is making available Intel-validated microcode updates that are related to Spectre Variant 3a (CVE-2018-3640 | Rogue System Register Read (RSRE)), Spectre Variant 4 (CVE-2018-3639 | Speculative Store Bypass (SSB)), and L1TF (CVE-2018-3620 and CVE-2018-3646 | L1 Terminal Fault).
The following table lists specific Microsoft Knowledge Base articles by Windows version. The article contains links to the available Intel microcode updates by CPU.
KB number and description |
Windows version |
Source |
Windows 10, version 1809, Windows Server 2019 |
Windows Update, Windows Server Update Service, and Microsoft Update Catalog |
|
Windows 10, version 1803, and Windows Server, version 1803 |
Windows Update, Windows Server Update Service, and Microsoft Update Catalog |
|
Windows 10, version 1709, and Windows Server 2016, version 1709 |
Windows Update, Windows Server Update Service, and Microsoft Update Catalog |
|
Windows 10, version 1703 |
Windows Update, Windows Server Update Service, and Microsoft Update Catalog |
|
Windows 10, version 1607, and Windows Server 2016 |
Windows Update, Windows Server Update Service, and Microsoft Update Catalog |
|
Windows 10 (RTM) |
Windows Update, Windows Server Update Service, and Microsoft Update Catalog |
Microsoft is making available Intel-validated microcode updates that are related to Microarchitectural Data Sampling (CVE-2019-11091, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130).
The following table lists specific Microsoft Knowledge Base articles by Windows version. The articles contain links to the available Intel microcode updates by CPU.
KB number and description |
Windows version |
Source |
Windows 10, version 1903 and 1909, Windows Server, version 1903 and 1909 |
Microsoft Update Catalog |
|
Windows 10, version 1809, Windows Server 2019 |
Microsoft Update Catalog |
|
Windows 10, version 1803, and Windows Server, version 1803 |
Microsoft Update Catalog |
|
Windows 10, version 1709, and Windows Server 2016, version 1709 |
Microsoft Update Catalog |
|
Windows 10, version 1703 |
Microsoft Update Catalog |
|
Windows 10, version 1607, and Windows Server 2016 |
Microsoft Update Catalog |
|
Windows 10 (RTM) |
Microsoft Update Catalog |
More information
We will offer additional Intel-validated microcode updates for Windows as they become available to Microsoft, and update these articles accordingly.
Customers should refer to information from Intel and their device manufacturer about the availability of applicable firmware security updates for the specific device, including the following:
We provide third-party contact information to help you find technical support. This contact information may change without notice. We do not guarantee the accuracy of this third-party contact information.