Microsoft Finds Itself Stuck in the middle of Intel's on-going PR Disaster

Intel has found itself on the wrong side of a security vulnerability and the company can’t seem to figure out how to properly get out of this hole beside continuing to dig down. After the company released vague and understated statements regarding the impact of these vulnerabilities, the company has now released a microcode update that is causing more issues than it fixes.

Microsoft has released an out-of-band Windows update that disables Intel’s fix. Why is Microsoft doing this? Intel’s update that was intended to make your device more secure is resulting in unexpected reboots and more alarming, data loss or corruption.

While Intel is testing and updating their code, Microsoft has released an update, KB4078130, that disables the mitigation against CVE-2017-5715 – “Branch target injection vulnerability”. Microsoft says that this update will prevent the reboots and data corruption and it covers Windows 7 (SP1), Windows 8.1, and all versions of Windows 10.

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

Microsoft has found itself in the middle of a security disaster and is being forced to work-over Intel’s sloppiness. Intel, which has been slow to release relevant information like the performance impact of patching your system, has continued to trip over its own feet while putting Microsoft in the middle of a problem that it cannot effectively handle on its own.

For the end user, if their computer randomly reboots or their data is lost because of the Intel patch, who are they going to blame? We all know the answer here is Microsoft when in reality, it’s Intel’s fault but to the average user, Microsoft will always be the culprit.

As of January 25th, there have been no known reports of these vulnerabilities being used to attack users but that doesn’t mean that this will be the case going forward. The clock is ticking for Intel to figure out an effective way to patch their vulnerability before attacks using this vulnerability become weaponized and used against companies and governments.

Related Topics:


Don't have a login but want to join the conversation? Sign up for a Petri Account

Comments (0)

Leave a Reply

Brad Sams has more than a decade of writing and publishing experience under his belt including helping to establish new and seasoned publications From breaking news about upcoming Microsoft products to telling the story of how a billion dollar brand was birthed in his book, Beneath a Surface, Brad is a well-rounded journalist who has established himself as a trusted name in the industry.
External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: