Important note about Windows Update KB4056892

There is another VERY IMPORTANT THING with Microsoft Meltdown patches like update KB4056892: – Customers will not receive these security updates and will not be protected from security vulnerabilities unless their anti-virus software vendor sets the following registry key:

Contact your Anti-Virus AV to confirm that their software is compatible and have set the following REGKEY on the machine

Key="HKEY_LOCAL_MACHINE"
Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat"
Value Name="cadca5fe-87d3-4b96-b7fb-a231484277cc"
Type="REG_DWORD"
Data="0x00000000"

Verify whether this QualityCompat regkey is present using PowerShell:

PS C:\Users\jan> (Get-ItemProperty "HKLM:SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat")

You can create the Registry DWORD key yourself if it’s not present:

D:\Users\JanR>type v:\dev\qualitycompat.reg
Windows Registry Editor Version 5.00

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat]
"cadca5fe-87d3-4b96-b7fb-a231484277cc"=dword:00000000

D:\Users\JanR>reg import v:\dev\qualitycompat.reg
The operation completed successfully.

You may find additional information regarding the Microsoft Windows security updates released here:

Microsoft has identified a compatibility issue with a small number of anti-virus software products.

The compatibility issue is caused when anti-virus applications make unsupported calls into Windows kernel memory. These calls may cause stop errors (also known as blue screen errors) that make the device unable to boot. To help prevent stop errors caused by incompatible anti-virus applications, Microsoft is only offering the Windows security updates released on January 3, 2018 to devices running anti-virus software from partners who have confirmed their software is compatible with the January 2018 Windows operating system security update.

If you have not been offered the security update, you may be running incompatible anti-virus software and you should follow up with your software vendor.

Microsoft has been working closely with anti-virus software partners to ensure all customers receive the January Windows security updates as soon as possible.

Make sure you install KB4056890 and KB4056892 to patch your systems for Meltdown and Spectre!

This may interest you:   XSS Vulnerability in Wordfence 6.1.1 to 6.1.6

Windows Server admins must enable the kernel-user space splitting feature once it is installed; it’s not on by default.

CNET reports:

Install the emergency Windows patch
Microsoft has released a rare, out-of-band emergency patch for Windows 10 users. It should pop up and ask you to restart your machine so it can be installed, but if you have yet to receive such a notification, then head to Settings > Update & security see if there are updates waiting on the Windows Update page. If you are running Windows 10 version 1709 (Fall Creators Update), the patch you need is labeled Security Update for Windows (KB4056892).

For older versions of Windows 10, here are the patch numbers:

  • Windows 10 version 1703 (Creators Update): KB4056891
  • Windows 10 version 1607 (Anniversary Update): KB4056890
  • Windows 10 version 1511 (November Update): KB4056888
  • Windows 10 version 1507 (Initial Release): KB4056893

Manual install route
If you have yet to receive the patch via Windows Update, you can manually install it by going to this Windows Update Catalog page. Odds are you are running a 64-bit version of Windows, so you’ll want to install the file for x64-based systems. For Fall Creators Update, for example, it’s the bottom-most option labeled “2018-01 Cumulative Update for Windows 10 Version 1709 for x64-based Systems (KB4056892).”

Meltdown and Spectre #

What are CVE-2017-5753 and CVE-2017-5715?
CVE-2017-5753 and CVE-2017-5715 are the official references to Spectre. CVE is the Standard for Information Security Vulnerability Names maintained by MITRE.

What is the CVE-2017-5754?
CVE-2017-5754 is the official reference to Meltdown. CVE is the Standard for Information Security Vulnerability Names maintained by MITRE.

This may interest you:   Old-school: Unix wildcards gone wild

See https://meltdownattack.com for more information.


Show your support


If you want to step in to help me cover the costs for running this website, that would be awesome. Just use this link to donate a cup of coffee ($5 USD for example). And please share the love and help others make use of this website. Thank you very much!


About the Author Jan Reilink

My name is Jan. I am not a hacker, coder, developer, programmer or guru. I am merely a system administrator, doing my daily thing at Vevida in the Netherlands. With over 15 years of experience, my specialties include Windows Server, IIS, Linux (CentOS, Debian), security, PHP, websites & optimization.

follow me on:

Leave a Reply

Be the First to Comment!

avatar
  Subscribe  
Notify of