News 1/5
Getac Technology Corporation Statement for 2024H1 Security Update
2024/08/23
Getac Technology Corporation Statement for 2024H1 Security Update NOTICE:Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Intel Corporation (“Intel”) / Insyde Software Corp. (“Insyde”) on supported Getac systems. Please refer to the table below to identify fixes for your systems. Release Date: 23rd Aug, 2024Latest Release Date: 23rd Aug, 2024 Summary: Intel SA-01051: A potential security vulnerability in some Intel® Processors may allow information disclosure. Intel is releasing microcode updates to mitigate this potential vulnerability. (link)Intel SA-01046: A potential security vulnerability in some Intel® Processor stream cache mechanisms may allow escalation of privilege. Intel is releasing microcode updates to mitigate this potential vulnerability. (link)Intel SA-00993: Potential security vulnerabilities in some Intel® Ethernet tools and driver install software may allow escalation of privilege. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Intel SA-00982: A potential security vulnerability in some Intel® Processors may allow information disclosure. Intel is releasing a firmware update to mitigate this potential vulnerability. (link)Intel SA-00972: A potential security vulnerability in the bus lock regulator mechanism for some Intel® Processors may allow denial of service. Intel is releasing firmware updates to mitigate this potential vulnerability.(link)Intel SA-00961: A potential security vulnerability in some Intel® Rapid Storage Technology software may allow escalation of privilege. Intel is releasing software updates to mitigate this potential vulnerability. (link)Intel SA-00950: A potential security vulnerability in some Intel® Processors may allow escalation of privilege and/or information disclosure and/or denial of service via local access. Intel is releasing firmware updates to mitigate this potential vulnerability. (link)Intel SA-00947: Potential security vulnerabilities in some Intel® PROSet/Wireless and Intel® Killer™ Wi-Fi software may allow escalation of privilege, information disclosure or denial of service. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Intel SA-00944: A potential security vulnerability in the Intel® Connectivity Performance Suite software for some Intel® Wireless Products may allow information disclosure. Intel is releasing software updates to mitigate this potential vulnerability. (link)Intel SA-00929: A potential security vulnerability in BIOS firmware for some Intel® Processors may allow escalation of privilege. Intel is releasing BIOS updates to mitigate this potential vulnerability. (link)Intel SA-00928: Potential security vulnerabilities in some Intel® Chipset Driver Software may allow escalation of privilege. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Intel SA-00923: Potential security vulnerabilities in the Intel® Converged Security Management Engine (CSME) installer, Intel® Local Manageability Service software and Intel® Server Platform Servcies (SPS) may allow information disclosure, escalation of privilege, or denial of service.(link)Intel SA-00898: A potential security vulnerability in some Intel® Atom® Processors may allow information disclosure. Intel is releasing firmware updates to mitigate this potential vulnerability. (link)Intel SA-00870: A potential security vulnerability in some Intel® Chipset Device Software may allow escalation of privilege. Intel is releasing software updates to mitigate this potential vulnerability. (link)Intel SA-00864: Potential security vulnerabilities in some Intel® Graphics drivers may allow escalation of privilege, denial of service and information disclosure. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Intel SA-00851: Potential security vulnerabilities in some Intel® Thunderbolt™ Declarative Componentized Hardware (DCH) drivers for Windows may allow escalation of privilege, denial of service, and/or information disclosure. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Insyde SA-2023040: IhisiServiceSmm: A vulnerability in the module that could allow an attacker to modify UEFI variables. (link)Insyde SA-2023047: SysPasswordDxe: Cleartext storage of system password could lead to possible information disclosure. (link)Insyde SA-2023048: Upgrade FreeType Build Tool to version 2.13.0. (link)Insyde SA-2023054: AsfSecureBootDxe: Stack buffer overflow vulnerability leading to arbitrary code execution during DXE phase. (link)Insyde SA-2023055: CsmInt10HookSmm: SMM memory corruption vulnerability in SMM driver (SMRAM write). (link)Insyde SA-2023056: IhisiServicesSmm: Arbitrary calls to SetVariable with unsanitized arguments in SMI handler. (link)Insyde SA-2023053: Improper input validation may be exploited via local access. (link)Insyde SA-2023059: IH2O-0802-2301 Code change to accommondate OpenSSL 1.1.1v (link)Insyde SA-2023031: VU#275256 Vulnerabilities in EDK2 Reference implementation of the UEFI Specification. (link)Insyde SA-2023066: VU#132380 Vulnerabilities in EDK2 NetworkPkg IP stack implementation. (link)Insyde SA-2023067: PnpSmm: Possible out of bounds in SMM communication buffer, leading to tampering. (link) Getac Affected Products and Recommendation:1. For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below: 2. The latest version solution is backwards-compatible with the previous version.GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00961)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX5007th Gen Core17.9.1.10097/31/2024https://support.getac.com/Portal/Page/809K1208th Gen Core17.9.1.10097/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00947)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadS41011th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/80913th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/809A14010th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/809B36010th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/80912th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/809V11010th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/80912th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/809F1108th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/80911th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00944)Product NameCPUGenerationSoftwareVersionSoftwareRelease StatusLatest Intel ® Connectivity Performance Suite softwarePlease click on the links below to downloadB36012th Gen Core3.1023.1118.17/31/2024https://support.getac.com/Portal/Page/809V11012th Gen Core3.1023.1118.17/31/2024https://support.getac.com/Portal/Page/809UX1012th Gen Core3.1023.1118.17/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00993)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen Core2.1.4.37/31/2024https://support.getac.com/Portal/Page/809X5007th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/809S41011th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/80913th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/809A14010th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/809B36010th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/80912th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/809K1208th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/80911th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/809V11010th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/80912th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/809F1108th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/80911th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/809UX1010th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/80912th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00928 / Intel SA-00870)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809X5007th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809S41011th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80913th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809A14010th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809B36010th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80912th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809K1208th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80911th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809V11010th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80912th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809F1108th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80911th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809UX1010th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80912th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00923)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809X5007th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809S41011th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80913th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809A14010th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809B36010th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80912th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809K1208th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80911th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809V11010th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80912th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809F1108th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80911th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809UX1010th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80912th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00864)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809S41011th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809B36012th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809K12011th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809V11012th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809F11011th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809UX1012th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00851)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809S41011th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809B36012th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809K12011th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809V11012th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809F11011th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809UX1012th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-01046/ Intel SA-00982/ Intel SA-00972/ Intel SA-00950/ Intel SA-00929/ Intel SA-00898/ All Insyde SAs)Product NameCPUGenerationBIOSVersionBIOSRelease StatusLatest BIOSPlease click on the links below to downloadX60011th Gen CoreR1.08.0705208/13/2024https://support.getac.com/Portal/Page/809X5007th Gen CoreR1.34.0705208/13/2024https://support.getac.com/Portal/Page/809S41011th Gen CoreR1.38.0705208/13/2024https://support.getac.com/Portal/Page/80913th Gen CoreR1.05.0705208/13/2024https://support.getac.com/Portal/Page/809A14010th Gen CoreR1.18.0705208/13/2024https://support.getac.com/Portal/Page/809B36010th Gen CoreR1.35.0705208/13/2024https://support.getac.com/Portal/Page/80912th Gen CoreR1.10.0705208/13/2024https://support.getac.com/Portal/Page/809K1208th Gen CoreR1.20.0705208/13/2024https://support.getac.com/Portal/Page/80911th Gen CoreR1.21.0705208/13/2024https://support.getac.com/Portal/Page/809V11010th Gen CoreR1.17.0705208/13/2024https://support.getac.com/Portal/Page/80912th Gen CoreR1.04.0705208/13/2024https://support.getac.com/Portal/Page/809F1108th Gen CoreR1.21.0705208/13/2024https://support.getac.com/Portal/Page/80911th Gen CoreR1.17.0705208/13/2024https://support.getac.com/Portal/Page/809UX1010th Gen CoreR1.24.0705208/13/2024https://support.getac.com/Portal/Page/80912th Gen CoreR1.08.0705208/13/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status.Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.
Getac Technology Corporation Statement for 2023H2 security update
2023/12/29
Getac Technology Corporation Statement for 2023H2 security update NOTICE:1. Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Intel Corporation (“Intel”) / Insyde Software Corp. (“Insyde”) on supported Getac systems. Please refer to the table below to identify fixes for your systems.2. A security vulnerability for various Getac products with UEFI has been identified by third-party researcher, Eclypsium Inc. (“Eclypsium”). The vulnerability may allow an arbitrary code execution during boot while secure boot is on. Getac has released BIOS updates for the affected Getac products and recommends our users to update to the latest version. Getac hereby appreciates Eclypsium for their effort in identifying and bringing the issue to our attention. Release Date: 29th Dec, 2023Latest Release Date: Updated: 29th Dec, 2023 Summary: Intel SA-00924: Potential security vulnerabilities in the BIOS firmware for some Intel® Processors may allow escalation of privilege or denial of service. Intel is releasing BIOS updates to mitigate these potential vulnerabilities. (link)Intel SA-00828: A potential security vulnerability in some Intel® Processors may allow information disclosure. Intel is releasing firmware updates and an optional software sequence to mitigate this potential vulnerability. (link)Intel SA-00813: Potential security vulnerabilities in the BIOS firmware for some Intel® Processors may allow escalation of privilege, information disclosure or denial of service. Intel is releasing firmware updates to mitigate these potential vulnerabilities. (link)Intel SA-00783: Potential security vulnerabilities in the Intel® Converged Security Management Engine (CSME), Active Management Technology (AMT) and Intel® Standard Manageability software may allow escalation of privilege or denial of service. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Intel SA-00766: Potential security vulnerabilities in some Intel® PROSet/Wireless WiFi and Killer™ WiFi products may allow escalation of privilege or denial of service. Intel is releasing firmware and software updates to mitigate these potential vulnerabilities. (link)Insyde SA-2023052: SystemFirmwareManagementRuntimeDxe: potential arbitrary code execution in the DXE phase (link)Insyde SA-2023045: TrEEConfigDriver: Vulnerable devices can report false TPM PCR values masking malware activity. (link)Insyde SA-2023050: Secure Boot Security Feature Bypass Vulnerability. (link)Insyde SA-2023047: SysPasswordDxe: Cleartext storage of system password could lead to possible information disclosure. (link)Insyde SA-2023039: FvbServicesRuntimeDxe: Exposes an SMI handler that allows an attacker to interact with the SPI flash. (link)Insyde SA-2023038: FDM TOCTOU access after measurement allows redirected code execution. (link)Insyde SA-2023036: MeSetup UEFI variable may be overwritten and causes DOS attacks. (link)Insyde SA-2023034: Insyde Setup EFI Variable Lock Bypass Vulnerability. (link)Insyde SA-2023026: [EDK2] Empty TPM Platform Auth. (link)Insyde SA-2023018: The CapsuleIFWUSmm driver does not check the return value which may cause memory leak. (link)Insyde SA-2023003: DMA attacks on the IHISI command buffer could cause TOCTOU issues which could lead to corruption of SMRAM and escalation of privileges. (link) Getac Affected Products and Recommendation:1. For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below: 2. The latest version solution is backwards-compatible with the previous version.GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00766)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/809S4108th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/80911th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/809A14010th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/809B36010th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/80912th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/809K12011th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/809V11010th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/80912th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/809F11011th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/809UX108th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/80910th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/80912th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/809T800CHT23.101/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00783)Product NameCPUGenerationME FWVersionME FWRelease StatusLatest ME FWPlease click on the links below to downloadX60011th Gen Core15.0.45.24111/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111060&cateid=100035X5007th Gen Core11.8.94.44941/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111055&cateid=100035S4108th Gen Core12.0.94.23801/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111057&cateid=10003511th Gen Core15.0.45.24111/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111059&cateid=100035A1406th Gen Core11.8.94.44941/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111054&cateid=10003510th Gen Core14.1.70.22281/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111058&cateid=100035B3008th Gen Core11.8.94.44941/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111054&cateid=100035B36010th Gen Core14.1.70.22281/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111058&cateid=10003512th Gen Core16.1.27.21761/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111061&cateid=100035K1208th Gen Core11.8.94.44941/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111054&cateid=10003511th Gen Core15.0.45.24111/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111059&cateid=100035V1108th Gen Core12.0.94.23801/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111057&cateid=10003510th Gen Core14.1.70.22281/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111058&cateid=10003512th Gen Core16.1.27.21761/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111061&cateid=100035F1108th Gen Core12.0.94.23801/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111057&cateid=10003511th Gen Core15.0.45.24111/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111059&cateid=100035UX108th Gen Core12.0.94.23801/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111057&cateid=10003510th Gen Core14.1.70.22281/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111058&cateid=10003512th Gen Core16.1.27.2171/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111061&cateid=100035* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00813/ Intel SA-00828/ Intel SA-00924/All Insyde SAs )Product NameCPUGenerationBIOSVersionBIOSRelease StatusLatest BIOSPlease click on the links below to downloadX60011th Gen CoreR1.05.0705201/31/2024https://support.getac.com/Portal/Page/809X5007th Gen CoreR1.32.0705201/31/2024https://support.getac.com/Portal/Page/809S4107th & 8th Gen Core (KBL)R1.31.0705201/31/2024https://support.getac.com/Portal/Page/8098th Gen CoreR1.28.0705201/31/2024https://support.getac.com/Portal/Page/80911th Gen CoreR1.35.0705201/31/2024https://support.getac.com/Portal/Page/80913th Gen CoreR1.02.0705201/31/2024https://support.getac.com/Portal/Page/809A1406th Gen CoreR1.24.0705201/31/2024https://support.getac.com/Portal/Page/80910th Gen CoreR1.16.0705291/31/2024https://support.getac.com/Portal/Page/809B3008th Gen CoreR1.19.0705201/31/2024https://support.getac.com/Portal/Page/809B36010th Gen CoreR1.32.0705201/31/2024https://support.getac.com/Portal/Page/80912th Gen CoreR1.06.0705201/31/2024https://support.getac.com/Portal/Page/809K1208th Gen CoreR1.19.0705201/31/2024https://support.getac.com/Portal/Page/80911th Gen CoreR1.19.0705201/31/2024https://support.getac.com/Portal/Page/809V1107th Gen CoreR1.22.0705201/31/2024https://support.getac.com/Portal/Page/8098th Gen CoreR1.17.0705201/31/2024https://support.getac.com/Portal/Page/80910th Gen CoreR1.15.0705201/31/2024https://support.getac.com/Portal/Page/80912th Gen CoreR1.01.0705201/31/2024https://support.getac.com/Portal/Page/809F1107th Gen CoreR1.27.0705201/31/2024https://support.getac.com/Portal/Page/8098th Gen CoreR1.20.0705201/31/2024https://support.getac.com/Portal/Page/80911th Gen CoreR1.14.0705201/31/2024https://support.getac.com/Portal/Page/809UX108th Gen CoreR1.21.0705201/31/2024https://support.getac.com/Portal/Page/80910th Gen CoreR1.22.0705201/31/2024https://support.getac.com/Portal/Page/80912th Gen CoreR1.06.0705201/31/2024https://support.getac.com/Portal/Page/809T800CHT T4R1.31.0705201/31/2024https://support.getac.com/Portal/Page/809EX80CHT T3R1.10.0705201/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.
Getac Technology Corporation Disclaimer on Microsoft Security Update (Windows Update KB5025885 for Secure Boot Changes Associated with CVE-2023-24932)
2023/10/31
Microsoft Security Update (Windows Update KB5025885)Getac Technology Corporation Disclaimer on Microsoft Security Update (Windows Update KB5025885 for Secure Boot Changes Associated with CVE-2023-24932)Updated: October 31th, 2023 Importance:Please note that this statement is to inform you of a critical Security Update issued by Microsoft. Users are advised to review the guidance and take actions recommended by Microsoft and below that may be updated from time to time to enable protections for the Secure Boot bypass and to avoid potential security risks and system failure. Please also note that Microsoft announced its recommended steps must be completed before moving to Final Enforcement, which is tentatively scheduled no sooner than July 9th, 2024. Bootable media may fail to start and result in your Getac devices being unable to start after Microsoft's Final Enforcement if the required steps are not completed in order. Additionally, please be aware that software distributed by Getac with or without the Getac brand name (including, but not limited to system software) is not covered under Getac’s Warranty. Getac is not responsible for any claims, damages, costs, or expenses arising from failure to follow instructions relating to Microsoft Security Update. BackgroundSince the Secure Boot security feature has been bypassed by the BlackLotus UEFI bootkit, which is tracked under CVE-2023-24932, Microsoft took action by releasing KB5025885 and security updates on May 9th, 2023, to manage the Windows Boot Manager revocations. Microsoft's Security updates are divided into four phases *¹, with the final phase being enforcement. The final enforcement phase, which will implement permanent mitigations on July 9th, 2024 Risk & Impact1. The BlackLotus UEFI bootkit vulnerability allows attackers to maintain control over and potentially manipulate the device. It is strongly recommended that all customers apply the Windows security updates released on May 9th 2023 (1st protection) & January 9th 2024 (2nd protection), to implement necessary security mitigations.2. The revocations will be programmatically enforced on July 9th, 2024. *¹ Therefore, if a device replaces its hard disk retained by the old Boot Manager, it may not be able to boot after the enforcement date.Detailed Instructions by MicrosoftPlease check Microsoft’s announcement regarding latest security update of CVE-2023-24932KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932 - Microsoft Support Actions for Getac UsersAll bootable media is suggested to be upgraded to the latest version and update with new boot-manager. Getac suggests our customers follow the actions outlined below based on different scenarios. Getac will release bootable recovery images (created by Getac Recovery Media Utility ("GRMU")*²) and tools to update boot-manager in recovery partition. 1. Image of new shipment with the latest security updates *³ and boot manager will be released in Table A. New shipment with January 9th, 2024, the security update will be ready after Microsoft’s release. Getac will announce the image schedule status after it is released. For a detailed list please refer to Table A: <Updated HDI Implementation Date> 2. For current customers using Getac devices (Shipped before Jul 31th, 2023)Please ensure that the MIS department is aware of the information outlined below and confirm that the old boot manager has been either removed or updated. This is crucial to prevent any issues with booting after Microsoft's enforcement stage on July 9th, 2024.l Please proceed with the Windows upgrade to install the latest version of Windows updates and consult with your MIS department for detailed mitigation action. Please make sure to update all updates released by Microsoft. Currently, there are 2 announced update versions (May 9th 2023 and January 9th 2024 versions) l Recovery partition: Please update the boot manager in the recovery partition using the Getac Recovery Partition Patch Tool available on Getac service portal. Before utilizing the Getac Recovery Partition Patch Tool, ensure that you have completed the Microsoft security update with a version released after May 9th. This step is crucial to ensure proper facilitation of the boot manager within the recovery partition. If the customer decides to ENABLE the revocations *⁹, please repeat this step every time you update with Microsoft's update to ensure the recovery partition contains the latest boot loader. 3. Scenario of system recovery via recovery image or hard disk replacement after revocations enforced:Please make sure to utilize the recovery images below for system recovery *6.l Using GRMU *8:Please download the latest Windows image *7 with security update via GRMU *² from https://support.getac.com/Service/FileReader/Index?fileid=109165&cateid=100038 to generate recovery media and perform the system recovery *4.Support model list as Table A: <Updated Image Implementation Date>.Both May 9th 2023 & January 9th 2024 versions are required to ensure security. For customization project, which is not on the list, please contact your account manager & FAE. Table A: < Updated Image Implementation Date>Models(Including -EX, -IP product variants)OS Version SupportedNew shipment with Security update Implementation Date*(May 9th 2023 version)Updated Recovery Image Release Date(May 9th 2023 version)Updated Recovery Image Release Date(Jan 9th 2024 version)X500G3, T800G2Windows 10 (22H2)Windows 10 IoT (21H2)July 31th, 2023October 17th ,2023TBDUX10G2/G2-R, V110G6, B360G1Windows 10 (22H2)Windows 11 (22H2)July 31th, 2023October 17th ,2023TBDF110G6, K120G2/G2-R, S410G4, A140G2, X600Windows 10 (22H2)July 31th, 2023October 17th ,2023TBDWindows 11 (22H2)October 19th ,2023October 17th ,2023TBDUX10G3, B360G2, V110G7Windows 11 (22H2)October 19th ,2023October 17th ,2023TBDX600 ServerServer 2022July 31th, 2023N/A**N/A*For customization projects, shipments after October 31th ,2023 will all be shipped with a Microsoft security update on May 9th ,2023. Please check with your SA for details.**X600 Server is not supported by GRMU, please check with the service team or sales for details.FAQ1. Under what circumstances would the system fail to boot?Starting from July 9th, 2024, Microsoft will enforce the revocation through an update. The old Boot Manager will be added to the disallowed signature database. If a device falls into any of the following scenarios involving the use of the old Boot Manager, it will fail to boot after July 9th, 2024.1.The user swaps their HDD and boots up using an OS that has not been updated with the KB released on May 9th, 2023.2.The user utilizes the original image of GRMU for USB boot.3.The user boots to the original WinPE using a USB drive.4.The device undergoes PXE booting to the original operating system.5.If the Recovery partition does not have the updated Boot Manager or contains an old Boot Manager.2. Can users voluntarily revoke the old boot manager before the first quarter of 2024?After applying Microsoft's May 9th update, users can follow Microsoft's instructions to voluntarily revoke the old Boot Manager earlier, which will be revoked on July 9th, 2024, as planned by Microsoft.3. What scenarios should we anticipate in the event of boot failure caused by either "the final phase of enforcement on July 9, 2024" or "the manual revocation of the old Boot Manager" by a user?Boot Manager: If the user selects the old Boot Manager to boot, it will flash a black screen and return to Boot Manager.Recovery Partition: The system will halt at the beginning of the Recovery Partition.System boot: The system will skip this boot device with the old Boot Manager and boot the next boot device.If you encounter the scenario mentioned above and are unable to boot the device, please refer to the next FAQ for assistance.4. What should I do if the system fails to boot after the final phase of enforcement on July 9th, 2024?Please disable the secure boot in the BIOS setup, update to the latest Windows update, and then enable secure boot.5. Will IOT LTSC version get support from these Security Update?Yes, LTSC will be included as long as it is still within the Microsoft life cycle. The IOT version after Win10 21H2 will get support as well. Please check with Microsoft for detailed support status5.6. What if an IOT LTSC customer disable Windows update (Or disable internet), will the device not be able to boot after July 9th, 2024?MSFT will push the accumulated updates once Wi-Fi or Windows Update is enabled. The device will be updated to a version with security updates. However, Getac strongly suggests updating to the latest version with security updates."7. Do I have to update both releases on May 9th, 2023, and January 9th, 2024?Yes,2 sets of protection are required to ensure security. Before final enforcement on July 9th, 2024, please make sure to verify your devices and all bootable media (including offline media) are updated and ready for this security hardening change. ¹ Details of revocations and the timing of updates, please refer to Microsoft instructions.² The GRMU image of certain Getac models will be updated to incorporate the Microsoft May 9th update.³ Microsoft security update regarding CVE-2023-24932 only support version after Windows 10 21H2.4 After recovery with above recovery images, recovery partition will be deleted.5 Information regarding version support is subject to change by Microsoft. For the most up-to-date information, please contact Microsoft directly. Microsoft reserves the right to make changes and such changes are unrelated to Getac.6 Once the new GRMU images with the updated Boot Manager are available for download, the older GRMU images will no longer be accessible for download. They will be replaced by the new images containing the updated Boot Manager.7 Microsoft's Knowledge Base (KB) only provides security updates for versions of Windows 10 after 21H2. However, the original recovery media is shipped with the same version as at the time of the order. Therefore, if the current version is not supported by Microsoft's security updates, Getac will offer the latest update-capable version, Windows 10 22H2.8 If you have downgraded Windows 10 Pro from Windows 11 Pro through a Microsoft Volume License, kindly reach out to Microsoft for recovery assistance and further information.⁹ Please check Microsoft’s security page for self-revocation detail Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an "as is" basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations, and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling and may not represent the actual risk to the users' local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user's own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.
Getac Technology Corporation Statement on Intel security update (IPU 2022.3 & 2023.1)
2023/06/15
Getac Technology Corporation Statement on Intel security update (IPU 2022.3 & 2023.1) NOTICE: Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Intel on supported Getac systems. Please refer to the table below to identify fixes for your systems. Release Date: 17th Mar, 2023Last Updated: 15th June, 2023 Summary: SA-00688: Potential security vulnerabilities in BIOS firmware for some Intel® Processors may allow escalation of privilege. Intel is releasing firmware updates to mitigate these potential vulnerabilities. (link)SA-00610: Potential security vulnerabilities in some Intel® Chipset Firmware in Intel® Converged Security and Manageability Engine (CSME), Intel® Active Management Technology (AMT) and Intel® Server Platform Services (SPS) may allow escalation of privilege or denial of service. Intel is releasing firmware updates to mitigate these potential vulnerabilities. (link)SA-00699: A potential security vulnerability in some Intel® PROSet/Wireless WiFi, Intel vPro® CSME WiFi and Killer™ WiFi products may allow denial of service. Intel is releasing a firmware update to mitigate this potential vulnerability. (link)SA-00717: Potential security vulnerabilities in the BIOS firmware and Intel® Trusted Execution Technology (TXT) Secure Initialization (SINIT) Authenticated Code Modules (ACM) for some Intel® Processors may allow escalation of privilege. Intel is releasing BIOS updates to mitigate these potential vulnerabilities. (link) Getac Affected Products and Recommendation:1. For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below: 2. The latest version solution is backwards-compatible with the previous version.GETAC AFFECTED PRODUCTS AND SOLUTION (SA-00610 / SA-00699)Product NameCPU GenerationME FWVersionME FWRelease StatusLatest ME FWPlease click on the links below to downloadX5007th Gen Core11.8.93.4323Available nowhttps://support.getac.com/Service/FileReader?fileid=110551&cateid=100183S4107th Gen Core11.8.93.4323Available nowhttps://support.getac.com/Service/FileReader?fileid=110550&cateid=1001838th Gen Core12.0.92.2145Available nowhttps://support.getac.com/Service/FileReader?fileid=110553&cateid=10018311th Gen Core15.0.42.2235Available nowhttps://support.getac.com/Service/FileReader?fileid=110555&cateid=100183A1406th Gen Core11.8.93.4323Available nowhttps://support.getac.com/Service/FileReader?fileid=110550&cateid=10018310th Gen Core14.1.67.2046Available nowhttps://support.getac.com/Service/FileReader?fileid=110554&cateid=100183B3008th Gen Core11.8.93.4323Available nowhttps://support.getac.com/Service/FileReader?fileid=110550&cateid=100183B36010th Gen Core14.1.67.2046Available nowhttps://support.getac.com/Service/FileReader?fileid=110554&cateid=100183K1208th Gen Core11.8.93.4323Available nowhttps://support.getac.com/Service/FileReader?fileid=110550&cateid=10018311th Gen Core15.0.42.2235Available nowhttps://support.getac.com/Service/FileReader?fileid=110555&cateid=100183V1107th Gen Core11.8.93.4323Available nowhttps://support.getac.com/Service/FileReader?fileid=110550&cateid=1001838th Gen Core12.0.92.2145Available nowhttps://support.getac.com/Service/FileReader?fileid=110553&cateid=10018310th Gen Core14.1.67.2046Available nowhttps://support.getac.com/Service/FileReader?fileid=110554&cateid=100183F1107th Gen Core11.8.93.4323Available nowhttps://support.getac.com/Service/FileReader?fileid=110550&cateid=1001838th Gen Core12.0.92.2145Available nowhttps://support.getac.com/Service/FileReader?fileid=110553&cateid=10018311th Gen Core15.0.42.2235Available nowhttps://support.getac.com/Service/FileReader?fileid=110555&cateid=100183UX108th Gen Core12.0.92.2145Available nowhttps://support.getac.com/Service/FileReader?fileid=110553&cateid=10018310th Gen Core14.1.67.2046Available nowhttps://support.getac.com/Service/FileReader?fileid=110554&cateid=100183* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (SA-00610 /SA-00699 )Product NameCPU GenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX5007th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/809S4107th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/8098th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/80911th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/809A1406th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/80910th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/809B3008th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/809B36010th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/809K1208th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/80911th Gen Core22.180Available nowhttps://support.getac.com/Portal/Page/809V1107th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/8098th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/80910th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/809F1107th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/8098th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/80911th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/809UX108th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/80910th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (SA-00688 )Product NameCPU GenerationBIOSVersionBIOSRelease StatusLatest BIOSPlease click on the links below to downloadX5007th Gen CoreR1.29Available nowhttps://support.getac.com/Portal/Page/809S4107th Gen CoreR1.26Available nowhttps://support.getac.com/Portal/Page/8098th Gen CoreR1.25Available nowhttps://support.getac.com/Portal/Page/80911th Gen CoreR1.31Available nowhttps://support.getac.com/Portal/Page/809A1406th Gen CoreR1.22Available nowhttps://support.getac.com/Portal/Page/809 10th Gen CoreR1.13Available nowhttps://support.getac.com/Portal/Page/809B3008th Gen CoreR1.17Available nowhttps://support.getac.com/Portal/Page/809B36010th Gen CoreR1.28Available nowhttps://support.getac.com/Portal/Page/809K1208th Gen CoreR1.17Available nowhttps://support.getac.com/Portal/Page/80911th Gen CoreR1.16Available nowhttps://support.getac.com/Portal/Page/809V1107th Gen CoreR1.20Available nowhttps://support.getac.com/Portal/Page/8098th Gen CoreR1.14Available nowhttps://support.getac.com/Portal/Page/80910th Gen CoreR1.13Available nowhttps://support.getac.com/Portal/Page/809F1107th Gen CoreR1.25Available nowhttps://support.getac.com/Portal/Page/8098th Gen CoreR1.18Available nowhttps://support.getac.com/Portal/Page/80911th Gen CoreR1.11Available nowhttps://support.getac.com/Portal/Page/809UX108th Gen CoreR1.19Available nowhttps://support.getac.com/Portal/Page/80910th Gen CoreR1.18Available nowhttps://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (SA-00717 )Product NameCPUGenerationBIOSVersionBIOSRelease StatusLatest BIOSPlease click on the links below to downloadX5007th Gen CoreR1.30.0705202023.6.30https://support.getac.com/Portal/Page/809S4107th Gen CoreR1.29.0705202023.6.30https://support.getac.com/Portal/Page/8098th Gen CoreR1.26.0705202023.6.30https://support.getac.com/Portal/Page/80911th Gen CoreR1.32.0705202023.6.30https://support.getac.com/Portal/Page/809A14010th Gen CoreR1.14.0705202023.6.30https://support.getac.com/Portal/Page/809B3008th Gen CoreR1.18.0705202023.6.30https://support.getac.com/Portal/Page/809B36010th Gen CoreR1.31.0705202023.6.30https://support.getac.com/Portal/Page/809K1208th Gen CoreR1.18.0705202023.6.30https://support.getac.com/Portal/Page/80911th Gen CoreR1.17.0705202023.6.30https://support.getac.com/Portal/Page/809V1107th Gen CoreR1.21.0705202023.6.30https://support.getac.com/Portal/Page/8098th Gen CoreR1.15.0705202023.6.30https://support.getac.com/Portal/Page/80910th Gen CoreR1.14.0705202023.6.30https://support.getac.com/Portal/Page/809F1107th Gen CoreR1.26.0705202023.6.30https://support.getac.com/Portal/Page/8098th Gen CoreR1.19.0705202023.6.30https://support.getac.com/Portal/Page/80911th Gen CoreR1.13.0705202023.6.30https://support.getac.com/Portal/Page/809UX108th Gen CoreR1.20.0705202023.6.30https://support.getac.com/Portal/Page/80910th Gen CoreR1.21.0705202023.6.30https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.
Getac Technology Corporation Statement on Trusted Platform Module Firmware Security Update
2023/05/26
Getac Technology Corporation Statement on Trusted Platform Module Firmware Security Update Notice:Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Nuvoton Technology Corporation (“Nuvoton”) to supported Getac systems. Please refer to the table below to identify fixes for your systems. Release Date: 1st Apr, 2022Last Updated: 26 May, 2023 Summary: Nuvoton has informed Getac of a potential vulnerability that an attacker with physical access to Nuvoton Trusted Platform Module (“TPM”) NPCT75x (7.2.x before 7.2.2.0) could extract an Elliptic Curve Cryptography private key via a side-channel attack against ECDSA because of an Observable Timing Discrepancy. (link)CVEID: CVE-2020-25082 Getac Affected Products and Recommendations:1. For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below. 2. The latest version solution is backwards-compatible with the previous version.Getac Affected Products and SolutionProduct NameCPU GenerationTPMFW VersionRelease DateSolution LinkA14010th Gen7.2.1.030 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035B3008th Gen7.2.0.1 / 7.2.0.230 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035B36010th Gen7.2.1.030 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035F1108th Gen7.2.0.1 / 7.2.0.2 30 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035F11011th Gen7.2.1.026 May, 2023https://support.getac.com/Service/FileReader?fileid=110703&cateid=100183K1208th Gen7.2.0.1 / 7.2.0.230 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035K12011th Gen7.2.1.026 May, 2023https://support.getac.com/Service/FileReader?fileid=110703&cateid=100183S4108th Gen7.2.0.1 / 7.2.0.230 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035S41011th Gen7.2.1.026 May, 2023https://support.getac.com/Service/FileReader?fileid=110703&cateid=100183UX108th Gen7.2.0.1 / 7.2.0.230 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035UX1010th Gen7.2.1.030 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035V1108th Gen7.2.0.1 / 7.2.0.230 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035V11010th Gen7.2.1.030 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035RX107th Gen7.2.0.1 / 7.2.0.230 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035* Please note that the schedule above is subject to change due to test status. Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.