News 1/5
Microsoft Secure Boot Certificate Transition (2023 CA) and BlackLotus Mitigation
2025/12/31
Please refer to the following links for updated information.Microsoft Secure Boot Certificate Transition (2023 CA) and BlackLotus Mitigation|Getac
Getac Technology Corporation Statement for 2025H2 security update
2025/12/12
Please visit below link for Getac Technology Corporation Statement for 2025H2 security update.https://www.getac.com/intl/help-support/security-update/
How to Update TPM Firmware
2025/10/09
ApplicationsThe TPM firmware update is applicable to the following models.Model NameSystem ReleaseX600MP modelUpdate ProceduresPart 1. Create a USB drive for the firmware update.Insert a USB drive.Format the USB drive to FAT32. (The original data on the USB drive will be erased.)Download the IFXTPMWUpd.zip file from download linkDecompress the IFXTPMWUpd.zip file to the USB drive. The snapshot below shows the result.5. Remove the USB drive.Part 2. Update the TPM firmware.NOTE: TPM firmware update will cause loss of all TPM keys and data protected by those keys.Disable BitLocker on Windows OS (Windows 11 Pro and Windows Server 2022). Select Control Panel □ System and Security □ BitLocker Drive Encryption. Turn off BitLocker.System insert USB TPM firmware update diskEnter Boot Manager.- For notebook models, press F10 during POST.- For tablet models, press the Menu hardware button or tap the touchscreen during POST.Select EFI USB Device and press Enter. (On tablet models, the Enter key is the Windows logo hardware button.) This allows EFI to boot from the USB drive containing the TPM firmware update.UEFI boot from USB TPM firmware update diskExecute IFXTPMUpdPlease run this program after the system automatically restartsEnter Boot Manager.- For notebook models, press F10 during POST.- For tablet models, press the Menu hardware button or tap the touchscreen during POST.Select EFI USB Device and press Enter. (On tablet models, the Enter key is the Windows logo hardware button.) This allows EFI to boot from the USB drive containing the TPM firmware update.UEFI boot from USB TPM firmware update diskExecute IFXTPMUpdWait for the TPM firmware update to finishPress power button to power off systemRestart the system.
Getac Technology Corporation Statement on Trusted Platform Module Firmware Security Update
2025/10/09
Getac Technology Corporation Statement on Trusted Platform Module Firmware Security Update Notice:Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Infineon Technology Corporation (“Infineon”) to supported Getac systems. Please refer to the table below to identify fixes for your systems. Release Date: 10 Jun, 2025Last Updated: 24 Sep, 2025 Summary: Infineon has informed Getac of a potential vulnerability identified as CVE-2025-2884 in the TPM 2.0 reference implementation code published by the Trusted Computing Group, which may allow an attacker to read up to 65535 bytes past the end of that buffer. The CVE-2025-2884 could result in information disclosure or denial of service of the TPM (link)CVEID: CVE-2025-2884 Getac Affected Products and Recommendations:1. For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below. 2. The latest version solution is backwards-compatible with the previous version. Getac Affected Products and SolutionsProduct NameCPU GenerationTPM FW VersionRelease DateSolution LinkX60011th Gen7.8608 Oct, 2025https://support.getac.com/Service/FileReader/Index?fileid=111871&cateid=100035* Please note that the schedule above is subject to change due to test status. Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.
Getac Technology Corporation Statement for 2024H2 security update.
2025/02/28
Getac Technology Corporation Statement for 2024H2 security update. NOTICE:Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Intel Corporation (“Intel”) / Insyde Software Corp. (“Insyde”) on supported Getac systems. Please refer to the table below to identify fixes for your systems. Release Date: 28th Feb, 2025Latest Release Date: 28th Feb, 2025Summary: This security update is for 2024H2, but during the testing period, issues from 2025Q1 were also partially covered. Please refer to the SAs below for further information. Intel SA-01167: Potential security vulnerabilities in some Intel® PROSet/Wireless WiFi products may allow escalation of privilege or denial of service. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Intel SA-01166: A potential security vulnerability in some Intel® Processors may allow denial of service. Intel is releasing microcode updates to mitigate this potential vulnerability. (link)Intel SA-01097: A potential security vulnerability in some Intel® Processors may allow denial of service. Intel is releasing firmware updates to mitigate this potential vulnerability. (link)Intel SA-01083: A potential security vulnerability in SMI Transfer monitor (STM) may allow escalation of privilege. Intel is releasing microcode updates to mitigate this potential vulnerability. (link)Intel SA-01071: Potential security vulnerabilities in UEFI firmware for some Intel® Processors may allow escalation of privilege, denial of service or information disclosure. Intel is releasing UEFI firmware updates to mitigate these potential vulnerabilities. (link)Intel SA-00999: Potential security vulnerabilities in Intel® Converged Security and Manageability Engine (CSME), Intel® Active Management Technology (AMT), Intel® Standard Manageability, Intel® PROSet/Wireless and Intel® Killer™ Wi-Fi software may allow escalation of privilege, denial of service, or information disclosure. Intel is releasing firmware updates to mitigate these potential vulnerabilities. (link) Insyde SA-2024001: SMM memory corruption vulnerability could lead to escalating privileges in SMM. (CWE-822). (link)Insyde SA-2024006: [EDK2] FirmwarePerformancePei: Potential UINT32 overflow and subsequent divide by 0. (link)Insyde SA-2024007: IhisiServiceSmm: A vulnerability in the module could allow an attacker to modify UEFI variables. (link)Insyde SA-2024014: IhisiServiceSmm: TcgMor: Potential memory leak vulnerability. (link) Getac Affected Products and Recommendation:1. For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below: 2. The latest version solution is backwards-compatible with the previous version.GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-01167)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809S510Intel Core Ultra Series 123.100.0.42/28/2025https://support.getac.com/Portal/Page/809S41011th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80913th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809A14010th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809B36010th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80912th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809K1208th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80911th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80913th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809V11010th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80912th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809F1108th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80911th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80913th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809UX1010th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80912th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00999/ Intel SA-01071/ Intel SA-01083/ Intel SA-01097/ Intel SA-01166/ All Insyde SAs)Product NameCPUGenerationBIOSVersionBIOSRelease StatusLatest BIOSPlease click on the links below to downloadX60011th Gen CoreR1.12.0705202/28/2025https://support.getac.com/Portal/Page/809S510Intel Core Ultra Series 1R1.03.0705202/28/2025https://support.getac.com/Portal/Page/809S41011th Gen CoreR1.39.0705202/28/2025https://support.getac.com/Portal/Page/80913th Gen CoreR1.07.0705202/28/2025https://support.getac.com/Portal/Page/809A14010th Gen CoreR.1.20.0705202/28/2025https://support.getac.com/Portal/Page/809B36010th Gen CoreR1.36.0705202/28/2025https://support.getac.com/Portal/Page/80912th Gen CoreR1.12.0705202/28/2025https://support.getac.com/Portal/Page/809K1208th Gen CoreR1.21.0705202/28/2025https://support.getac.com/Portal/Page/80911th Gen CoreR1.22.0705202/28/2025https://support.getac.com/Portal/Page/80913th Gen CoreR1.04.0705202/28/2025https://support.getac.com/Portal/Page/809V11010th Gen CoreR1.18.0705202/28/2025https://support.getac.com/Portal/Page/80912th Gen CoreR1.05.0705202/28/2025https://support.getac.com/Portal/Page/809F1108th Gen CoreR1.22.0705202/28/2025https://support.getac.com/Portal/Page/80911th Gen CoreR1.18.0705202/28/2025https://support.getac.com/Portal/Page/80913th Gen CoreR1.05.0705202/28/2025https://support.getac.com/Portal/Page/809UX1010th Gen CoreR1.10.0705202/28/2025https://support.getac.com/Portal/Page/80912th Gen CoreR1.25.0705202/28/2025https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.