Current security status: Good
Current Intel support status: Retired as of 1 July 2020 (self-support only from Intel after this date. Intel customer-agent support has ended.) Note: Support is provided by Apple.
Current microcode revision: 42E (1070 decimal)
-Future microcode updates: Yes, if necessary, according to Intel Customer Support for servers
-End date for microcode updates: Determined by Apple (Intel will provide them as requested from Apple)
-How to obtain current microcode revision: Included with latest firmware (boot ROM) applied via macOS updates
Current identified vulnerabilities:
No new vulnerabilities known to affect systems running current software or macOS
Intel vulnerabilities by processor list:
AFFECTED PROCESSORS: Latest Transient Execution Attacks by Product CPU Model
Note that the list shows two vulnerabilities affecting these processors, but when contacted, an Intel Customer Support representative clarified those vulnerabilities either don't affect these processors or systems running macOS. More info in post # 26.
Current Intel support status: Retired as of 1 July 2020 (self-support only from Intel after this date. Intel customer-agent support has ended.) Note: Support is provided by Apple.
Current microcode revision: 42E (1070 decimal)
-Future microcode updates: Yes, if necessary, according to Intel Customer Support for servers
-End date for microcode updates: Determined by Apple (Intel will provide them as requested from Apple)
-How to obtain current microcode revision: Included with latest firmware (boot ROM) applied via macOS updates
Current identified vulnerabilities:
No new vulnerabilities known to affect systems running current software or macOS
Intel vulnerabilities by processor list:
AFFECTED PROCESSORS: Latest Transient Execution Attacks by Product CPU Model
Note that the list shows two vulnerabilities affecting these processors, but when contacted, an Intel Customer Support representative clarified those vulnerabilities either don't affect these processors or systems running macOS. More info in post # 26.
Last edited: