This table shows the impact of transient execution attacks on currently supported Intel products, back to Spectre and Meltdown, including recommended mitigation where affected. Click the associated Intel Guidance linked in the table header for specific mitigation information. Use the scrollbars to view full guidance.

1CPUID description: Example CPUID = 906EB. Family = 06 / Extended Model = 9 / Model Number = E / Stepping ID = B. See Intel Software Developer’s Manual Version 071, Volume 2A, Figure 3-6 for reference.

2Blank cells indicate a platform is not impacted by the microcode updates: 2020.1 MCU updates only apply to Vector Register Sampling, L1D Eviction Sampling and Special Register Buffer Data Sampling. Consult relevant Security Advisories for other microcode guidance.

Linux Users: The microcode image is named after the family/model/stepping. You can locate these from /proc/cpuinfo. Example: For Family 06, Model 85, Stepping 4 (values in decimal), the corresponding microcode file is 06-55-04 located in /lib/firmware/intel-ucode/ (values in hexadecimal).

Look at the microcode version number at the official public Intel microcode website. Calculate Family-Model-Stepping before downloading appropriate microcode.

Windows users: Read the version with the following PowerShell command: reg query HKLM\HARDWARE\DESCRIPTION\System\CentralProcessor\0 /v "Update Revision" or use the Intel® Processor Identification Utility tool to check the microcode version and compare against the latest microcode listed above.

For more information on finding microcode versions, visit: https://www.intel.com/content/www/us/en/support/articles/000055672/processors.html.

For more information on Intel processor numbering, visit: https://www.intel.com/content/www/us/en/processors/processor-numbers.html

3This column describes mitigations for RDMSR at CPL3 and RDMSR in a VMX guest when the VMM indicates that MSR should cause a VM exit. See the linked Intel Guidance for more details on other aspects of v3a.

4Software tools for Intel® SGX; only if SGX is supported.

5Intel is not aware of any real-world impact outside Intel® SGX and is only releasing mitigations for SGX software. Software mitigation outside of SGX may be possible. Please see guidance for additional information.

6See Intel Guidance for more information.

Download the most current affected processor spreadsheet below.

AFFECTED PROCESSORS: Latest Transient Execution Attacks by Product CPU Model