Solved Is my winre.wim the latest?


The recovery environment hardly gets updated, i have not come cross where malware using WinRE to infect machines WinRE provides recovery tools.

Just had to activate the jinx by saying it didn't you? :-) Can't imagine anyone being stupid enough to download a WinRE image from a third party though.
 

My Computer

System One

  • OS
    11 Pro 23H2
    Computer type
    Laptop
    Manufacturer/Model
    MSI
    CPU
    i7-10750H
    Motherboard
    MSI MS-17F5
    Memory
    16GB Samsung DDR4 3200
    Graphics Card(s)
    Intel + Nvidia RTX3060 Laptop
    Sound Card
    Realtek
    Monitor(s) Displays
    Samsung 24" Curved
    Screen Resolution
    1920x1080
    Hard Drives
    Sabrent Rocket Gen3 1Tb Smasung EVO 870 1TB
    Antivirus
    Avast
I dont know why you want it, but for info This is from the latest iso release

en-us_windows_11_consumer_editions_version_23h2_updated_april_2024_x64_dvd_d986680b.iso

the next updated iso will probably be released around 20th May

Information for Image 1
-----------------------
Index: 1
Name: Microsoft Windows Recovery Environment (amd64)
Description: Microsoft Windows Recover Environment (amd64)
Directory Count: 5444
File Count: 20870
Total Bytes: 2922542869
Hard Link Bytes: 1281218300
Creation Time: Sat May 07 05:53:32 2022 UTC
Last Modification Time: Fri Apr 05 22:39:40 2024 UTC
Architecture: x86_64
Product Name: Microsoft« Windows« Operating System
Edition ID: WindowsPE
Installation Type: WindowsPE
Product Type: WinNT
Languages: en-US
Default Language: en-US
System Root: WINDOWS
Major Version: 10
Minor Version: 0
Build: 22621
Service Pack Build: 3447
Service Pack Level: 0
WIMBoot compatible: no
 

My Computers

System One System Two

  • OS
    Win7
    Computer type
    PC/Desktop
    CPU
    i5-8400
    Motherboard
    gigabyte b365m ds3h
    Memory
    2x8gb 3200mhz
    Monitor(s) Displays
    benq gw2480
    PSU
    bequiet pure power 11 400CM
    Cooling
    cryorig m9i
  • Operating System
    win7
    Computer type
    PC/Desktop
    CPU
    pentium g5400
    Motherboard
    gigabyte b365m ds3h
    Memory
    1x8gb 2400
    PSU
    xfx pro 450
The recovery environment hardly gets updated, i have not come cross where malware using WinRE to infect machines WinRE provides recovery tools.
Ok, but please could you answer my question in post #1? I did not ask why, when or if. I just asked how to find out if my winre.wim was the latest available.
 

My Computers

System One System Two

  • OS
    11 Pro 23H2 OS build 22631.3593
    Computer type
    Laptop
    Manufacturer/Model
    Acer Swift SF114-34
    CPU
    Pentium Silver N6000 1.10GHz
    Memory
    4GB
    Screen Resolution
    1920 x 1080
    Hard Drives
    SSD
    Cooling
    fanless
    Internet Speed
    13Mbps
    Browser
    Brave, Edge or Firefox
    Antivirus
    Webroot Secure Anywhere
    Other Info
    System 3

    ASUS T100TA Transformer
    Processor Intel Atom Z3740 @ 1.33GHz
    Installed RAM 2.00 GB (1.89 GB usable)
    System type 32-bit operating system, x64-based processor

    Edition Windows 10 Home
    Version 22H2 build 19045.3570
  • Operating System
    Windows 11 Pro 23H2 22631.2506
    Computer type
    Laptop
    Manufacturer/Model
    HP Mini 210-1090NR PC (bought in late 2009!)
    CPU
    Atom N450 1.66GHz
    Memory
    2GB
Ok, but please could you answer my question in post #1? I did not ask why, when or if. I just asked how to find out if my winre.wim was the latest available.
You find me a Microsoft link that shows every version of WinRe.wim then i can tell you which version you have.
 

My Computer

System One

  • OS
    Windows 11
    Computer type
    PC/Desktop
    Manufacturer/Model
    HP Pavilion
    CPU
    AMD Ryzen 7 5700G
    Motherboard
    Erica6
    Memory
    Micron Technology DDR4-3200 16GB
    Graphics Card(s)
    NVIDIA GeForce RTX 3060
    Sound Card
    Realtek ALC671
    Monitor(s) Displays
    Samsung SyncMaster U28E590
    Screen Resolution
    3840 x 2160
    Hard Drives
    SAMSUNG MZVLQ1T0HALB-000H1
The recovery environment hardly gets updated, i have not come cross where malware using WinRE to infect machines WinRE provides recovery tools.
Odd stance to take, given the whole CVE-2024-20666 kerfuffle.
 

My Computers

System One System Two

  • OS
    Windows 11 Pro 23H2 [rev. 3447]
    Computer type
    PC/Desktop
    Manufacturer/Model
    Intel NUC12WSHi7
    CPU
    12th Gen Intel Core i7-1260P, 2100 MHz
    Motherboard
    NUC12WSBi7
    Memory
    64 GB
    Graphics Card(s)
    Intel Iris Xe
    Sound Card
    built-in Realtek HD audio
    Monitor(s) Displays
    Dell U3219Q
    Screen Resolution
    3840x2160 @ 60Hz
    Hard Drives
    Samsung SSD 990 PRO 1TB
    Keyboard
    CODE 104-Key Mechanical Keyboard with Cherry MX Clears
  • Operating System
    Linux Mint 21.2 (Cinnamon)
    Computer type
    PC/Desktop
    Manufacturer/Model
    Intel NUC8i5BEH
    CPU
    Intel Core i5-8259U CPU @ 2.30GHz
    Memory
    32 GB
    Graphics card(s)
    Iris Plus 655
    Keyboard
    CODE 104-Key Mechanical Keyboard - Cherry MX Clear

My Computer

System One

  • OS
    Windows 11
    Computer type
    PC/Desktop
    Manufacturer/Model
    HP Pavilion
    CPU
    AMD Ryzen 7 5700G
    Motherboard
    Erica6
    Memory
    Micron Technology DDR4-3200 16GB
    Graphics Card(s)
    NVIDIA GeForce RTX 3060
    Sound Card
    Realtek ALC671
    Monitor(s) Displays
    Samsung SyncMaster U28E590
    Screen Resolution
    3840 x 2160
    Hard Drives
    SAMSUNG MZVLQ1T0HALB-000H1
Well duh, but your position was that malware didn’t use RE, but that was the whole point of that patch, that it’s possible.
 

My Computers

System One System Two

  • OS
    Windows 11 Pro 23H2 [rev. 3447]
    Computer type
    PC/Desktop
    Manufacturer/Model
    Intel NUC12WSHi7
    CPU
    12th Gen Intel Core i7-1260P, 2100 MHz
    Motherboard
    NUC12WSBi7
    Memory
    64 GB
    Graphics Card(s)
    Intel Iris Xe
    Sound Card
    built-in Realtek HD audio
    Monitor(s) Displays
    Dell U3219Q
    Screen Resolution
    3840x2160 @ 60Hz
    Hard Drives
    Samsung SSD 990 PRO 1TB
    Keyboard
    CODE 104-Key Mechanical Keyboard with Cherry MX Clears
  • Operating System
    Linux Mint 21.2 (Cinnamon)
    Computer type
    PC/Desktop
    Manufacturer/Model
    Intel NUC8i5BEH
    CPU
    Intel Core i5-8259U CPU @ 2.30GHz
    Memory
    32 GB
    Graphics card(s)
    Iris Plus 655
    Keyboard
    CODE 104-Key Mechanical Keyboard - Cherry MX Clear
Well duh, but your position was that malware didn’t use RE, but that was the whole point of that patch, that it’s possible.
Well you are a rude individual, aren't you i think you did not read physical access its not malware as the malware aren't individuals are just codes.

An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.
 

My Computer

System One

  • OS
    Windows 11
    Computer type
    PC/Desktop
    Manufacturer/Model
    HP Pavilion
    CPU
    AMD Ryzen 7 5700G
    Motherboard
    Erica6
    Memory
    Micron Technology DDR4-3200 16GB
    Graphics Card(s)
    NVIDIA GeForce RTX 3060
    Sound Card
    Realtek ALC671
    Monitor(s) Displays
    Samsung SyncMaster U28E590
    Screen Resolution
    3840 x 2160
    Hard Drives
    SAMSUNG MZVLQ1T0HALB-000H1
Yes I read the entire CVE.
 

My Computers

System One System Two

  • OS
    Windows 11 Pro 23H2 [rev. 3447]
    Computer type
    PC/Desktop
    Manufacturer/Model
    Intel NUC12WSHi7
    CPU
    12th Gen Intel Core i7-1260P, 2100 MHz
    Motherboard
    NUC12WSBi7
    Memory
    64 GB
    Graphics Card(s)
    Intel Iris Xe
    Sound Card
    built-in Realtek HD audio
    Monitor(s) Displays
    Dell U3219Q
    Screen Resolution
    3840x2160 @ 60Hz
    Hard Drives
    Samsung SSD 990 PRO 1TB
    Keyboard
    CODE 104-Key Mechanical Keyboard with Cherry MX Clears
  • Operating System
    Linux Mint 21.2 (Cinnamon)
    Computer type
    PC/Desktop
    Manufacturer/Model
    Intel NUC8i5BEH
    CPU
    Intel Core i5-8259U CPU @ 2.30GHz
    Memory
    32 GB
    Graphics card(s)
    Iris Plus 655
    Keyboard
    CODE 104-Key Mechanical Keyboard - Cherry MX Clear
Yes I read the entire CVE.
Then where is the malware comes in as the article says attacker with physical access?

A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. An attacker with physical access to the target could exploit this vulnerability to gain access to encrypted data.
 

My Computer

System One

  • OS
    Windows 11
    Computer type
    PC/Desktop
    Manufacturer/Model
    HP Pavilion
    CPU
    AMD Ryzen 7 5700G
    Motherboard
    Erica6
    Memory
    Micron Technology DDR4-3200 16GB
    Graphics Card(s)
    NVIDIA GeForce RTX 3060
    Sound Card
    Realtek ALC671
    Monitor(s) Displays
    Samsung SyncMaster U28E590
    Screen Resolution
    3840 x 2160
    Hard Drives
    SAMSUNG MZVLQ1T0HALB-000H1
Because I don't know if a newer version might be worth having! Why does anyone update Windows when they don't know if an update might make their computer function better, be more secure or improve resilience against malware?
WinRE.wim is updated to latest version when Windows versions update. The build for WinRE.wim may not be the same as the Windows build as Windows only updates WinRE.wim as required.

It has worked this way for many years. In other words, there is no need to worry if you have the latest version.

The only times you may end up with an older version is if you manually copied an older version or Windows 11 updates somehow glitched, not updating WinRE.wim.

Regarding updates, one thing is 100% sure, if you do not update, then any known security holes will not be fixed.

Of course, there is a small chance an upgrade does introduce a new issue, but then it will (hopefully) be fixed on the next update.

It is pointless using logic "I am not going to update as that may cause me issues".
The best approach is to make an image backup, update, knowing you can revert IF you get issues.

A lot of people wait until an update has been out for a while before updating, but this is a rather falacious argument, as you do not get protection benefit of any bugs fixed by new update.

Also bugs affect people differently anyway, so you can never tell if you will be affected by a bug until you update. Again the image backup approach is the best approach.
 

My Computer

System One

  • OS
    Windows 10 Pro + others in VHDs
    Computer type
    Laptop
    Manufacturer/Model
    ASUS Vivobook 14
    CPU
    I7
    Motherboard
    Yep, Laptop has one.
    Memory
    16 GB
    Graphics Card(s)
    Integrated Intel Iris XE
    Sound Card
    Realtek built in
    Monitor(s) Displays
    N/A
    Screen Resolution
    1920x1080
    Hard Drives
    1 TB Optane NVME SSD, 1 TB NVME SSD
    PSU
    Yep, got one
    Case
    Yep, got one
    Cooling
    Stella Artois
    Keyboard
    Built in
    Mouse
    Bluetooth , wired
    Internet Speed
    72 Mb/s :-(
    Browser
    Edge mostly
    Antivirus
    Defender
    Other Info
    TPM 2.0
Then where is the malware comes in as the article says attacker with physical access?
That's just the vector for transmission, some attacks require physically using the device such as DMA drive bys, which is why DMA protection was introduced.

Let's think of it this way, biological viruses (human malware) have different means of transmission such as being physically bitten or breathing in airborne material, the same applies to computer systems.
 

My Computer

System One

  • OS
    Windows 11, Windows 10, Linux Fedora Cinnamon
That's just the vector for transmission, some attacks require physically using the device such as DMA drive bys, which is why DMA protection was introduced.

Let's think of it this way, biological viruses (human malware) have different means of transmission such as being physically bitten or breathing in airborne material, the same applies to computer systems.
Is this your definition of this or vulnerability or Microsoft?
 

My Computer

System One

  • OS
    Windows 11
    Computer type
    PC/Desktop
    Manufacturer/Model
    HP Pavilion
    CPU
    AMD Ryzen 7 5700G
    Motherboard
    Erica6
    Memory
    Micron Technology DDR4-3200 16GB
    Graphics Card(s)
    NVIDIA GeForce RTX 3060
    Sound Card
    Realtek ALC671
    Monitor(s) Displays
    Samsung SyncMaster U28E590
    Screen Resolution
    3840 x 2160
    Hard Drives
    SAMSUNG MZVLQ1T0HALB-000H1
Microsoft points an attacker with physical access how is the malware going to physical access to WinRe?
 

My Computer

System One

  • OS
    Windows 11
    Computer type
    PC/Desktop
    Manufacturer/Model
    HP Pavilion
    CPU
    AMD Ryzen 7 5700G
    Motherboard
    Erica6
    Memory
    Micron Technology DDR4-3200 16GB
    Graphics Card(s)
    NVIDIA GeForce RTX 3060
    Sound Card
    Realtek ALC671
    Monitor(s) Displays
    Samsung SyncMaster U28E590
    Screen Resolution
    3840 x 2160
    Hard Drives
    SAMSUNG MZVLQ1T0HALB-000H1
You're either being deliberately obnoxious or haven't read anything which I've written.

An attack vector is just means of transmission i.e. how a malicious script or program is delivered to the machine. That's all it means.

Some vulnerabilities require physical access in order to setup the exploit.
 

My Computer

System One

  • OS
    Windows 11, Windows 10, Linux Fedora Cinnamon

My Computer

System One

  • OS
    Windows 11
    Computer type
    PC/Desktop
    Manufacturer/Model
    HP Pavilion
    CPU
    AMD Ryzen 7 5700G
    Motherboard
    Erica6
    Memory
    Micron Technology DDR4-3200 16GB
    Graphics Card(s)
    NVIDIA GeForce RTX 3060
    Sound Card
    Realtek ALC671
    Monitor(s) Displays
    Samsung SyncMaster U28E590
    Screen Resolution
    3840 x 2160
    Hard Drives
    SAMSUNG MZVLQ1T0HALB-000H1
I dont know why you want it, but for info This is from the latest iso release

en-us_windows_11_consumer_editions_version_23h2_updated_april_2024_x64_dvd_d986680b.iso

the next updated iso will probably be released around 20th May

Information for Image 1
-----------------------
Index: 1
Name: Microsoft Windows Recovery Environment (amd64)
Description: Microsoft Windows Recover Environment (amd64)
Directory Count: 5444
File Count: 20870
Total Bytes: 2922542869
Hard Link Bytes: 1281218300
Creation Time: Sat May 07 05:53:32 2022 UTC
Last Modification Time: Fri Apr 05 22:39:40 2024 UTC
Architecture: x86_64
Product Name: Microsoft« Windows« Operating System
Edition ID: WindowsPE
Installation Type: WindowsPE
Product Type: WinNT
Languages: en-US
Default Language: en-US
System Root: WINDOWS
Major Version: 10
Minor Version: 0
Build: 22621
Service Pack Build: 3447
Service Pack Level: 0
WIMBoot compatible: no
Since I'm on a higher build number, there would be no point in my downloading that iso.
 

My Computers

System One System Two

  • OS
    11 Pro 23H2 OS build 22631.3593
    Computer type
    Laptop
    Manufacturer/Model
    Acer Swift SF114-34
    CPU
    Pentium Silver N6000 1.10GHz
    Memory
    4GB
    Screen Resolution
    1920 x 1080
    Hard Drives
    SSD
    Cooling
    fanless
    Internet Speed
    13Mbps
    Browser
    Brave, Edge or Firefox
    Antivirus
    Webroot Secure Anywhere
    Other Info
    System 3

    ASUS T100TA Transformer
    Processor Intel Atom Z3740 @ 1.33GHz
    Installed RAM 2.00 GB (1.89 GB usable)
    System type 32-bit operating system, x64-based processor

    Edition Windows 10 Home
    Version 22H2 build 19045.3570
  • Operating System
    Windows 11 Pro 23H2 22631.2506
    Computer type
    Laptop
    Manufacturer/Model
    HP Mini 210-1090NR PC (bought in late 2009!)
    CPU
    Atom N450 1.66GHz
    Memory
    2GB
I'm reading this article, which one did you read?

I've read the exact same article, I've just been trying to explain what attack vector means, however, you don't seem to understand that, you've just been back pedalling since @pseymour pointed out your nonsensical stance that you don't need to ever update the Windows RE image since it never contains vulnerabilities which are exploited. That was your original point.

An attack vector is either how a malicious payload is delivered to a machine or how an malicious action is able to be carried out. Some will require physical access to the machine like this example or to be more obvious, conducting DMA drive by attacks.

I give up...
 

My Computer

System One

  • OS
    Windows 11, Windows 10, Linux Fedora Cinnamon
An attack could come in the form of a give-away USB thumb drive. Maybe as part of a promotion, so this would be a physical attack without the attacker directly accessing your computer. I heard an account of someone giving away DVDs outside a large company. It only takes one employee to compromise a whole company's network if they don't have suitable defences.
 

My Computers

System One System Two

  • OS
    11 Pro 23H2 OS build 22631.3593
    Computer type
    Laptop
    Manufacturer/Model
    Acer Swift SF114-34
    CPU
    Pentium Silver N6000 1.10GHz
    Memory
    4GB
    Screen Resolution
    1920 x 1080
    Hard Drives
    SSD
    Cooling
    fanless
    Internet Speed
    13Mbps
    Browser
    Brave, Edge or Firefox
    Antivirus
    Webroot Secure Anywhere
    Other Info
    System 3

    ASUS T100TA Transformer
    Processor Intel Atom Z3740 @ 1.33GHz
    Installed RAM 2.00 GB (1.89 GB usable)
    System type 32-bit operating system, x64-based processor

    Edition Windows 10 Home
    Version 22H2 build 19045.3570
  • Operating System
    Windows 11 Pro 23H2 22631.2506
    Computer type
    Laptop
    Manufacturer/Model
    HP Mini 210-1090NR PC (bought in late 2009!)
    CPU
    Atom N450 1.66GHz
    Memory
    2GB
Back
Top Bottom