How to test MDS (Zombieload) patch status on Windows systems


Four new vulnerabilities have been discovered in Intel processors that can be exploited via speculative execution side-channel attacks called RIDL, Fallout, and ZombieLoad.

These vulnerabilities allow attackers to steal passwords, cryptographic keys, or any other type of data to be loaded or stored in the memory of the CPU buffers.

The vulnerabilities are being categorized as Microarchitectural Data Sampling (MDS) speculative execution vulnerabilities and are associated with the four uniquely identifiable CVEs below:

  • CVE-2018-12126 – Microarchitectural Store Buffer Data Sampling (MSBDS)
  • CVE-2018-12130 – Microarchitectural Fill Buffer Data Sampling (MFBDS)
  • CVE-2018-12127 – Microarchitectural Load Port Data Sampling (MLPDS)
  • CVE-2019-11091 – Microarchitectural Data Sampling Uncacheable Memory (MDSUM)

For more information on how these vulnerabilities work, who discovered them, and how you can test if you are vulnerable, you can read our New RIDL and Fallout Attacks Impact All Modern Intel CPUs article.

Researchers have also setup dedicated pages about these attacks, which are listed below:

Read more…