Affected processors for each security advisory are included in the published disclosure guidance and can also be found under the Resources tab. We have also published a consolidated Affected Processors by Product CPU guide that includes recommended mitigations to help developers assess the impact of transient execution attacks on currently supported Intel® products. The Security Center also identifies which processors are affected within each specific advisory.
Microcode updates (MCU) are typically included with operating system (OS) updates from your OS vendor. End users do not have to take any special actions to apply these mitigations other than ensuring that your system OS and drivers are up to date. Contact your OS vendor for information on which OS versions incorporate the latest microcode. We have also published expanded Microcode Update Guidance that explains details about the MCU process on current Intel processors. Microcode requirements also can be found on the Security Center for each specific advisory.
Intel always recommends running the latest microcode for your system by using an updated BIOS or by OS loading of microcode updates if supported by the platform. See the Security Center for each advisory with the latest details on what options are available. This is especially true when mitigating potential side-channel cache exploits.
Refer to this support site for finding a list of Intel Processors that changed or will change in Intel® Interactive support or servicing updates. These changes are separate from Intel’s warranties, supply guidance and agreements, and do not alter, expand, or extend any existing contractual rights or obligations.
Software Security Guidance Home | Advisory Guidance | Technical Documentation | Best Practices | Resources
Product and Performance Information
Performance varies by use, configuration and other factors. Learn more at www.Intel.com/PerformanceIndex.