News 1/5
Getac Technology Corporation Statement on Microsoft Security Update (Windows Update KB5025885 for Secure Boot Changes Associated with CVE-2023-24932)
2023/06/09
Getac Technology Corporation Statement on Microsoft Security Update (Windows Update KB5025885 for Secure Boot Changes Associated with CVE-2023-24932) Updated: 6/9/2023 (June 9th) BackgroundSince the Secure Boot security feature has been bypassed by the BlackLotus UEFI bootkit, which is tracked under CVE-2023-24932, Microsoft took action by releasing KB5025885 and security updates on May 9th, 2023, to manage the Windows Boot Manager revocations. Microsoft's Security updates are divided into three phases¹, with the final phase being enforcement. The final enforcement phase, which will implement permanent mitigations, is tentatively scheduled for the first quarter of 2024. Risk & Impact1. The BlackLotus UEFI bootkit vulnerability allows attackers to maintain control over and potentially manipulate the device. It is strongly recommended that all customers apply the Windows security updates released on May 9th, 2023, to implement necessary security mitigations.2. The revocations will be programmatically enforced in the first quarter of 2024.¹ Therefore, if a device replaces its hard disk retained by the old Boot Manager, it will not be able to boot after the enforcement date. Detailed Instructions by MicrosoftKB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932 - Microsoft Support Actions for Getac UsersAll bootable media is suggested to be upgraded to the latest version. Getac suggests our customers follow the actions outlined below based on different scenarios. Getac will announce the timing for bootable images (created by Getac Recovery Media Utility ("GRMU")²), including the recovery partition. 1. For current customers using Getac devices: Please proceed with the Windows upgrade process to install the latest version of Windows.2. Scenario of system recovery or replace hard disk replacement after revocations enforced:l Using GRMU: Please download the latest GRMU² and perform the system recovery.l Recovery partition²: Getac will release a tool to make the necessary modifications. FAQUnder what circumstances would the system fail to boot?Starting from the first quarter of 2024, Microsoft will enforce the revocation through an update. The old Boot Manager will be added to the disallowed signature database. If a device falls into any of the following scenarios involving the use of the old Boot Manager, it will fail to boot after the first quarter of 2024.1. The user swaps their HDD and boots up using an OS that has not been updated with the KB released on May 9th, 2023.2. The user utilizes the original image of GRMU for USB boot.3. The user boots to the original WinPE using a USB drive.4. The device undergoes PXE booting to the original operating system.5. If the Recovery partition does not have the updated Boot Manager or contains an old Boot Manager. What should I do if the system fails to boot after the final phase of enforcement in the first quarter of 2024?Disable the secure boot in the BIOS setup, update to the latest Windows update, and then enable secure boot. Can users voluntarily revoke the disabled bootloader before the first quarter of 2024?After applying Microsoft's May 9th update, users can follow Microsoft's instructions to voluntarily revoke the old Boot Manager, which will be revoked in the first quarter of 2024. What should I do if Microsoft does not provide updates for the Windows version on the device?Users can manually update their Windows 10 version 22H2 through Windows Update, which will also include the Boot Manager update. Alternatively, users can update to a version with security updates by using the recovery media (GRMU) provided by Getac. ³ ¹ Details of revocations and the timing of updates, please refer to Microsoft instructions. ² ³ The GRMU image of certain Getac models will be updated to incorporate the Microsoft May 9th update. The release date for the new version of GRMU and the recovery partition tool will be announced separately. Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an "as is" basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations, and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling and may not represent the actual risk to the users' local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user's own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.
Getac Technology Corporation Statement on Intel security update (IPU 2022.3 & 2023.1)
2023/06/15
Getac Technology Corporation Statement on Intel security update (IPU 2022.3 & 2023.1) NOTICE: Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Intel on supported Getac systems. Please refer to the table below to identify fixes for your systems. Release Date: 17th Mar, 2023Last Updated: 15th June, 2023 Summary: SA-00688: Potential security vulnerabilities in BIOS firmware for some Intel® Processors may allow escalation of privilege. Intel is releasing firmware updates to mitigate these potential vulnerabilities. (link)SA-00610: Potential security vulnerabilities in some Intel® Chipset Firmware in Intel® Converged Security and Manageability Engine (CSME), Intel® Active Management Technology (AMT) and Intel® Server Platform Services (SPS) may allow escalation of privilege or denial of service. Intel is releasing firmware updates to mitigate these potential vulnerabilities. (link)SA-00699: A potential security vulnerability in some Intel® PROSet/Wireless WiFi, Intel vPro® CSME WiFi and Killer™ WiFi products may allow denial of service. Intel is releasing a firmware update to mitigate this potential vulnerability. (link)SA-00717: Potential security vulnerabilities in the BIOS firmware and Intel® Trusted Execution Technology (TXT) Secure Initialization (SINIT) Authenticated Code Modules (ACM) for some Intel® Processors may allow escalation of privilege. Intel is releasing BIOS updates to mitigate these potential vulnerabilities. (link) Getac Affected Products and Recommendation:1. For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below: 2. The latest version solution is backwards-compatible with the previous version.GETAC AFFECTED PRODUCTS AND SOLUTION (SA-00610 / SA-00699)Product NameCPU GenerationME FWVersionME FWRelease StatusLatest ME FWPlease click on the links below to downloadX5007th Gen Core11.8.93.4323Available nowhttps://support.getac.com/Service/FileReader?fileid=110551&cateid=100183S4107th Gen Core11.8.93.4323Available nowhttps://support.getac.com/Service/FileReader?fileid=110550&cateid=1001838th Gen Core12.0.92.2145Available nowhttps://support.getac.com/Service/FileReader?fileid=110553&cateid=10018311th Gen Core15.0.42.2235Available nowhttps://support.getac.com/Service/FileReader?fileid=110555&cateid=100183A1406th Gen Core11.8.93.4323Available nowhttps://support.getac.com/Service/FileReader?fileid=110550&cateid=10018310th Gen Core14.1.67.2046Available nowhttps://support.getac.com/Service/FileReader?fileid=110554&cateid=100183B3008th Gen Core11.8.93.4323Available nowhttps://support.getac.com/Service/FileReader?fileid=110550&cateid=100183B36010th Gen Core14.1.67.2046Available nowhttps://support.getac.com/Service/FileReader?fileid=110554&cateid=100183K1208th Gen Core11.8.93.4323Available nowhttps://support.getac.com/Service/FileReader?fileid=110550&cateid=10018311th Gen Core15.0.42.2235Available nowhttps://support.getac.com/Service/FileReader?fileid=110555&cateid=100183V1107th Gen Core11.8.93.4323Available nowhttps://support.getac.com/Service/FileReader?fileid=110550&cateid=1001838th Gen Core12.0.92.2145Available nowhttps://support.getac.com/Service/FileReader?fileid=110553&cateid=10018310th Gen Core14.1.67.2046Available nowhttps://support.getac.com/Service/FileReader?fileid=110554&cateid=100183F1107th Gen Core11.8.93.4323Available nowhttps://support.getac.com/Service/FileReader?fileid=110550&cateid=1001838th Gen Core12.0.92.2145Available nowhttps://support.getac.com/Service/FileReader?fileid=110553&cateid=10018311th Gen Core15.0.42.2235Available nowhttps://support.getac.com/Service/FileReader?fileid=110555&cateid=100183UX108th Gen Core12.0.92.2145Available nowhttps://support.getac.com/Service/FileReader?fileid=110553&cateid=10018310th Gen Core14.1.67.2046Available nowhttps://support.getac.com/Service/FileReader?fileid=110554&cateid=100183* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (SA-00610 /SA-00699 )Product NameCPU GenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX5007th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/809S4107th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/8098th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/80911th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/809A1406th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/80910th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/809B3008th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/809B36010th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/809K1208th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/80911th Gen Core22.180Available nowhttps://support.getac.com/Portal/Page/809V1107th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/8098th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/80910th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/809F1107th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/8098th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/80911th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/809UX108th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/80910th Gen Core22.160Available nowhttps://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (SA-00688 )Product NameCPU GenerationBIOSVersionBIOSRelease StatusLatest BIOSPlease click on the links below to downloadX5007th Gen CoreR1.29Available nowhttps://support.getac.com/Portal/Page/809S4107th Gen CoreR1.26Available nowhttps://support.getac.com/Portal/Page/8098th Gen CoreR1.25Available nowhttps://support.getac.com/Portal/Page/80911th Gen CoreR1.31Available nowhttps://support.getac.com/Portal/Page/809A1406th Gen CoreR1.22Available nowhttps://support.getac.com/Portal/Page/809 10th Gen CoreR1.13Available nowhttps://support.getac.com/Portal/Page/809B3008th Gen CoreR1.17Available nowhttps://support.getac.com/Portal/Page/809B36010th Gen CoreR1.28Available nowhttps://support.getac.com/Portal/Page/809K1208th Gen CoreR1.17Available nowhttps://support.getac.com/Portal/Page/80911th Gen CoreR1.16Available nowhttps://support.getac.com/Portal/Page/809V1107th Gen CoreR1.20Available nowhttps://support.getac.com/Portal/Page/8098th Gen CoreR1.14Available nowhttps://support.getac.com/Portal/Page/80910th Gen CoreR1.13Available nowhttps://support.getac.com/Portal/Page/809F1107th Gen CoreR1.25Available nowhttps://support.getac.com/Portal/Page/8098th Gen CoreR1.18Available nowhttps://support.getac.com/Portal/Page/80911th Gen CoreR1.11Available nowhttps://support.getac.com/Portal/Page/809UX108th Gen CoreR1.19Available nowhttps://support.getac.com/Portal/Page/80910th Gen CoreR1.18Available nowhttps://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (SA-00717 )Product NameCPU GenerationBIOSVersionBIOSRelease Status Latest BIOSPlease click on the links below to downloadX5007th Gen CoreR1.30.0705202023.6.30https://support.getac.com/Portal/Page/809S4107th Gen CoreR1.29.0705202023.6.30https://support.getac.com/Portal/Page/8098th Gen CoreR1.26.0705202023.6.30https://support.getac.com/Portal/Page/80911th Gen CoreR1.32.0705202023.6.30https://support.getac.com/Portal/Page/809A14010th Gen CoreR1.14.0705202023.6.30https://support.getac.com/Portal/Page/809B3008th Gen CoreR1.18.0705202023.6.30https://support.getac.com/Portal/Page/809B36010th Gen CoreR1.31.0705202023.6.30https://support.getac.com/Portal/Page/809K1208th Gen CoreR1.18.0705202023.6.30https://support.getac.com/Portal/Page/80911th Gen CoreR1.17.0705202023.6.30https://support.getac.com/Portal/Page/809V1107th Gen CoreR1.21.0705202023.6.30https://support.getac.com/Portal/Page/8098th Gen CoreR1.15.0705202023.6.30https://support.getac.com/Portal/Page/80910th Gen CoreR1.14.0705202023.6.30https://support.getac.com/Portal/Page/809F1107th Gen CoreR1.26.0705202023.6.30https://support.getac.com/Portal/Page/8098th Gen CoreR1.19.0705202023.6.30https://support.getac.com/Portal/Page/80911th Gen CoreR1.13.0705202023.6.30https://support.getac.com/Portal/Page/809UX108th Gen CoreR1.20.0705202023.6.30https://support.getac.com/Portal/Page/80910th Gen CoreR1.21.0705202023.6.30https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.
Getac Technology Corporation Statement on Trusted Platform Module Firmware Security Update
2023/05/26
Getac Technology Corporation Statement on Trusted Platform Module Firmware Security Update Notice:Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Nuvoton Technology Corporation (“Nuvoton”) to supported Getac systems. Please refer to the table below to identify fixes for your systems. Release Date: 1st Apr, 2022Last Updated: 26 May, 2023 Summary: Nuvoton has informed Getac of a potential vulnerability that an attacker with physical access to Nuvoton Trusted Platform Module (“TPM”) NPCT75x (7.2.x before 7.2.2.0) could extract an Elliptic Curve Cryptography private key via a side-channel attack against ECDSA because of an Observable Timing Discrepancy. (link)CVEID: CVE-2020-25082 Getac Affected Products and Recommendations:1. For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below. 2. The latest version solution is backwards-compatible with the previous version.Getac Affected Products and SolutionProduct NameCPU GenerationTPMFW VersionRelease DateSolution LinkA14010th Gen7.2.1.030 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035B3008th Gen7.2.0.1 / 7.2.0.230 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035B36010th Gen7.2.1.030 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035F1108th Gen7.2.0.1 / 7.2.0.2 30 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035F11011th Gen7.2.1.026 May, 2023https://support.getac.com/Service/FileReader?fileid=110703&cateid=100183K1208th Gen7.2.0.1 / 7.2.0.230 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035K12011th Gen7.2.1.026 May, 2023https://support.getac.com/Service/FileReader?fileid=110703&cateid=100183S4108th Gen7.2.0.1 / 7.2.0.230 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035S41011th Gen7.2.1.026 May, 2023https://support.getac.com/Service/FileReader?fileid=110703&cateid=100183UX108th Gen7.2.0.1 / 7.2.0.230 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035UX1010th Gen7.2.1.030 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035V1108th Gen7.2.0.1 / 7.2.0.230 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035V11010th Gen7.2.1.030 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035RX107th Gen7.2.0.1 / 7.2.0.230 May, 2022https://support.getac.com/Service/FileReader/Index?fileid=110401&cateid=100035* Please note that the schedule above is subject to change due to test status. Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.
Getac Technology Corporation Statement on Trusted Platform Module Firmware Security Vulnerability
2023/05/05
Getac Technology Corporation Statement on Trusted Platform Module Firmware Security VulnerabilityNotice:Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Nuvoton Technology Corporation (“Nuvoton”) to supported Getac systems. Please refer to the table below to identify fixes for your systems. Release Date: 14th Mar, 2023Latest Updated: 5th May, 2023 Summary: The potential vulnerabilities of CVE-2023-1017, CVE-2023-1018 were found existing in TPM2.0 module library which could potentially lead to denial of service and/or arbitrary code execution in the TPM contect.CVE-2023-1018: Getac products are not affected by CVE-2023-1018.CVE-2023-1017: It is reported that an attacker with physical access to Nuvoton Trusted Platform Module (“TPM”) NPCT65x with Firmware 1.3.0.1, 1.3.1.0 & 1.3.2.8 could not succeed in writing to or corrupting the TPM but does cause the NPCT65x to become inaccessible as it enters a recoverable protection mode intended to safeguard the NPCT65x and its contents. The functionality of NPCT65x can be restored by a full power cycle (Hard reset) when TPM is in protection mode. (link)CVEID: CVE-2023-1017, CVE-2023-1018Getac Affected Products and Recommendations:Upgrading to firmware version 1.3.2.20 will help to correct this issue; however, please note that version 1.3.2.20 is not FIPS, TCG or Common Criteria (CC) certified (though functionality wise, there are no real differences between versions 1.3.2.8 and 1.3.2.20 according to Nuvoton). For those who are unable to update to firmware version 1.3.2.20, please note that a full power cycle (Hard reset) can restore the functionality of NPCT65x when TPM is in protection mode due to an attack related to this vulnerability.Please check the affected products in the table below: Getac Affected Products and Solution Product Name CPU Generation TPM FW Version Release Date Solution Link A140 6th Gen 1.3.1.0 5th May, 2023 https://support.getac.com/Service/FileReader?fileid=110644&cateid=100183 F110 7th Gen 1.3.1.0 5th May, 2023 https://support.getac.com/Service/FileReader?fileid=110644&cateid=100183 S410 8th Gen 1.3.1.0 5th May, 2023 https://support.getac.com/Service/FileReader?fileid=110644&cateid=100183 V110 7th Gen 1.3.1.0 5th May, 2023 https://support.getac.com/Service/FileReader?fileid=110644&cateid=100183 X500 7th Gen 1.3.1.0 5th May, 2023 https://support.getac.com/Service/FileReader?fileid=110644&cateid=100183 Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.
UEFI-Based Malware Statement
2022/10/28
UEFI-Based Malware StatementGetac is aware of the CosmicStrand issue, which targets the Intel® H81 Chipset module. CosmicStrand is a rootkit malware with functionality designed to inspect the UEFI¹/BIOS firmware of targeted systems by discovering vulnerabilities and enabling attackers to read/write/erase the device’s BIOS. It is similar to the already-known Trickboot malware. Both can be categorized as UEFI-based malware.Getac products undergo a series of preventive measures and tests to ensure security against UEFI-based malware.From a BIOS and firmware perspective, all Getac products follow NIST 800-147 policy regarding BIOS write protection, protecting against program or erase commands.Regarding the OS layer, Getac has analyzed it using the CHIPSEC tool from Intel, which is a framework for analyzing the security of PC platforms, including hardware, system firmware (BIOS/UEFI), and platform components.Getac rugged products¹ have passed tests that ensure the protection of the UEFI BIOS from programmable SPI writes by malware and reduce the risk of attack by known threats.To ensure appropriate level of security against malware, we suggest you update the firmware to the latest version to mitigate various known vulnerabilities.¹ CHIPSEC analyzes the following platforms only: 11th Generation Intel® Core™ Processors, 10th Generation Intel® Core™ Processors, 8th Generation Intel® Core™ Processors, 7th Generation Intel® Core™ Processors, 6th Generation Intel® Core™ Processors, and Intel® Atom® x7-Z8750 ProcessorGetac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.