News 1/2
UEFI-Based Malware Statement
2022/10/28
UEFI-Based Malware StatementGetac is aware of the CosmicStrand issue, which targets the Intel® H81 Chipset module. CosmicStrand is a rootkit malware with functionality designed to inspect the UEFI¹/BIOS firmware of targeted systems by discovering vulnerabilities and enabling attackers to read/write/erase the device’s BIOS. It is similar to the already-known Trickboot malware. Both can be categorized as UEFI-based malware.Getac products undergo a series of preventive measures and tests to ensure security against UEFI-based malware.From a BIOS and firmware perspective, all Getac products follow NIST 800-147 policy regarding BIOS write protection, protecting against program or erase commands.Regarding the OS layer, Getac has analyzed it using the CHIPSEC tool from Intel, which is a framework for analyzing the security of PC platforms, including hardware, system firmware (BIOS/UEFI), and platform components.Getac rugged products¹ have passed tests that ensure the protection of the UEFI BIOS from programmable SPI writes by malware and reduce the risk of attack by known threats.To ensure appropriate level of security against malware, we suggest you update the firmware to the latest version to mitigate various known vulnerabilities.¹ CHIPSEC analyzes the following platforms only: 11th Generation Intel® Core™ Processors, 10th Generation Intel® Core™ Processors, 8th Generation Intel® Core™ Processors, 7th Generation Intel® Core™ Processors, 6th Generation Intel® Core™ Processors, and Intel® Atom® x7-Z8750 ProcessorGetac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.
Getac Technology Corporation Statement on Intel security update (2022.1 IPU)
2022/08/12
Getac Technology Corporation Statement on Intel security update (2022.1 IPU) NOTICE: Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Intel on supported Getac systems. Please refer to the table below to identify fixes for your systems. Release Date: 12th Aug, 2022 Last Updated: 12th Aug, 2022 Summary: SA-00601: Potential security vulnerabilities in the BIOS firmware or BIOS authenticated code module for some Intel Processors may allow escalation of privilege or information disclosure. Intel is releasing BIOS updates to mitigate these potential vulnerabilities. (link) SA-00613: A potential security vulnerability in Intel Boot Guard and Intel Trusted Execution Technology (TXT) for some Intel processors may allow escalation of privilege. Intel is releasing firmware updates and prescriptive guidance to mitigate this potential vulnerability. (link) SA-00614: A potential security vulnerability in the Intel Software Guard Extensions (SGX) Platform may allow information disclosure. Intel is releasing firmware updates to mitigate this potential vulnerability. (link) SA-00617: A potential security vulnerability in some Intel Processors may allow information disclosure. Intel is releasing firmware updates to mitigate this potential vulnerability. (link)Getac Affected Products and Recommendation: 1. For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below: 2. The latest version solution is backwards-compatible with the previous version.GETAC AFFECTED PRODUCTS AND SOLUTION (SA-00613)Product NameCPU GenerationME FWVersionME FWRelease DateLatest ME FWPlease click on the links below to downloadX5007th Gen Core11.8.92.4249 Donehttps://support.getac.com/Service/FileReader?fileid=110407&cateid=100183S4107th Gen Core11.8.92.4249 Donehttps://support.getac.com/Service/FileReader?fileid=110406&cateid=1001838th Gen Core12.0.90.2072Donehttps://support.getac.com/Service/FileReader?fileid=110408&cateid=10018311th Gen Core15.0.41.2158Donehttps://support.getac.com/Service/FileReader?fileid=110410&cateid=100183A1406th Gen Core11.8.92.4249 Donehttps://support.getac.com/Service/FileReader?fileid=110406&cateid=10018310th Gen Core14.1.65.1969Donehttps://support.getac.com/Service/FileReader?fileid=110409&cateid=100183B3008th Gen Core11.8.92.4249 Donehttps://support.getac.com/Service/FileReader?fileid=110406&cateid=100183B36010th Gen Core14.1.65.1969Donehttps://support.getac.com/Service/FileReader?fileid=110409&cateid=100183K1208th Gen Core11.8.92.4249 Donehttps://support.getac.com/Service/FileReader?fileid=110406&cateid=10018311th Gen Core15.0.41.2158 Donehttps://support.getac.com/Service/FileReader?fileid=110410&cateid=100183V1107th Gen Core11.8.92.4249Donehttps://support.getac.com/Service/FileReader?fileid=110406&cateid=1001838th Gen Core12.0.90.2072Donehttps://support.getac.com/Service/FileReader?fileid=110408&cateid=10018310th Gen Core14.1.65.1969Donehttps://support.getac.com/Service/FileReader?fileid=110409&cateid=100183F1107th Gen Core11.8.92.4249 Donehttps://support.getac.com/Service/FileReader?fileid=110406&cateid=1001838th Gen Core12.0.90.2072 Donehttps://support.getac.com/Service/FileReader?fileid=110408&cateid=10018311th Gen Core15.0.41.2158Donehttps://support.getac.com/Service/FileReader?fileid=110411&cateid=100183UX108th Gen Core12.0.90.2072Donehttps://support.getac.com/Service/FileReader?fileid=110408&cateid=10018310th Gen Core14.1.65.1969Donehttps://support.getac.com/Service/FileReader?fileid=110409&cateid=100183* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (SA-00601/SA-00614/SA00617 )Product NameCPU GenerationBIOSVersionBIOSRelease DateLatest BIOSPlease click on the links below to downloadX5007th Gen CoreR1.28.070520 31/Aughttps://support.getac.com/Portal/Page/809S4107th Gen CoreR1.27.07052031/Aughttps://support.getac.com/Portal/Page/8098th Gen CoreR1.23.07052031/Aughttps://support.getac.com/Portal/Page/80911th Gen CoreR1.25.07052031/Aughttps://support.getac.com/Portal/Page/809A1406th Gen CoreR1.21.07052031/Aughttps://support.getac.com/Portal/Page/80910th Gen CoreR1.12.070520 31/Aughttps://support.getac.com/Portal/Page/809B3008th Gen CoreR1.16.07052031/Aughttps://support.getac.com/Portal/Page/809B36010th Gen CoreR1.27.070520 31/Aughttps://support.getac.com/Portal/Page/809K1208th Gen CoreR1.16.070520 31/Aughttps://support.getac.com/Portal/Page/80911th Gen CoreR1.13.07052031/Aughttps://support.getac.com/Portal/Page/809V1107th Gen CoreR1.19.07052031/Aughttps://support.getac.com/Portal/Page/8098th Gen CoreR1.13.070520 31/Aughttps://support.getac.com/Portal/Page/80910th Gen CoreR1.12.07052031/Aughttps://support.getac.com/Portal/Page/809F1107th Gen CoreR1.24.07052031/Aughttps://support.getac.com/Portal/Page/8098th Gen CoreR1.17.070520 31/Aughttps://support.getac.com/Portal/Page/80911th Gen CoreR1.08.070520 31/Aughttps://support.getac.com/Portal/Page/809UX108th Gen CoreR1.18.07052031/Aughttps://support.getac.com/Portal/Page/80910th Gen CoreR1.16.07052031/Aughttps://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.