News 1/5
Getac Technology Corporation Statement for 2025H2 security update
2025/12/12
Please visit below link for Getac Technology Corporation Statement for 2025H2 security update.https://www.getac.com/intl/help-support/security-update/
How to Update TPM Firmware
2025/10/09
ApplicationsThe TPM firmware update is applicable to the following models.Model NameSystem ReleaseX600MP modelUpdate ProceduresPart 1. Create a USB drive for the firmware update.Insert a USB drive.Format the USB drive to FAT32. (The original data on the USB drive will be erased.)Download the IFXTPMWUpd.zip file from download linkDecompress the IFXTPMWUpd.zip file to the USB drive. The snapshot below shows the result.5. Remove the USB drive.Part 2. Update the TPM firmware.NOTE: TPM firmware update will cause loss of all TPM keys and data protected by those keys.Disable BitLocker on Windows OS (Windows 11 Pro and Windows Server 2022). Select Control Panel □ System and Security □ BitLocker Drive Encryption. Turn off BitLocker.System insert USB TPM firmware update diskEnter Boot Manager.- For notebook models, press F10 during POST.- For tablet models, press the Menu hardware button or tap the touchscreen during POST.Select EFI USB Device and press Enter. (On tablet models, the Enter key is the Windows logo hardware button.) This allows EFI to boot from the USB drive containing the TPM firmware update.UEFI boot from USB TPM firmware update diskExecute IFXTPMUpdPlease run this program after the system automatically restartsEnter Boot Manager.- For notebook models, press F10 during POST.- For tablet models, press the Menu hardware button or tap the touchscreen during POST.Select EFI USB Device and press Enter. (On tablet models, the Enter key is the Windows logo hardware button.) This allows EFI to boot from the USB drive containing the TPM firmware update.UEFI boot from USB TPM firmware update diskExecute IFXTPMUpdWait for the TPM firmware update to finishPress power button to power off systemRestart the system.
Getac Technology Corporation Statement on Trusted Platform Module Firmware Security Update
2025/10/09
Getac Technology Corporation Statement on Trusted Platform Module Firmware Security Update Notice:Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Infineon Technology Corporation (“Infineon”) to supported Getac systems. Please refer to the table below to identify fixes for your systems. Release Date: 10 Jun, 2025Last Updated: 24 Sep, 2025 Summary: Infineon has informed Getac of a potential vulnerability identified as CVE-2025-2884 in the TPM 2.0 reference implementation code published by the Trusted Computing Group, which may allow an attacker to read up to 65535 bytes past the end of that buffer. The CVE-2025-2884 could result in information disclosure or denial of service of the TPM (link)CVEID: CVE-2025-2884 Getac Affected Products and Recommendations:1. For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below. 2. The latest version solution is backwards-compatible with the previous version. Getac Affected Products and SolutionsProduct NameCPU GenerationTPM FW VersionRelease DateSolution LinkX60011th Gen7.8608 Oct, 2025https://support.getac.com/Service/FileReader/Index?fileid=111871&cateid=100035* Please note that the schedule above is subject to change due to test status. Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.
Getac Technology Corporation Statement for 2024H2 security update.
2025/02/28
Getac Technology Corporation Statement for 2024H2 security update. NOTICE:Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Intel Corporation (“Intel”) / Insyde Software Corp. (“Insyde”) on supported Getac systems. Please refer to the table below to identify fixes for your systems. Release Date: 28th Feb, 2025Latest Release Date: 28th Feb, 2025Summary: This security update is for 2024H2, but during the testing period, issues from 2025Q1 were also partially covered. Please refer to the SAs below for further information. Intel SA-01167: Potential security vulnerabilities in some Intel® PROSet/Wireless WiFi products may allow escalation of privilege or denial of service. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Intel SA-01166: A potential security vulnerability in some Intel® Processors may allow denial of service. Intel is releasing microcode updates to mitigate this potential vulnerability. (link)Intel SA-01097: A potential security vulnerability in some Intel® Processors may allow denial of service. Intel is releasing firmware updates to mitigate this potential vulnerability. (link)Intel SA-01083: A potential security vulnerability in SMI Transfer monitor (STM) may allow escalation of privilege. Intel is releasing microcode updates to mitigate this potential vulnerability. (link)Intel SA-01071: Potential security vulnerabilities in UEFI firmware for some Intel® Processors may allow escalation of privilege, denial of service or information disclosure. Intel is releasing UEFI firmware updates to mitigate these potential vulnerabilities. (link)Intel SA-00999: Potential security vulnerabilities in Intel® Converged Security and Manageability Engine (CSME), Intel® Active Management Technology (AMT), Intel® Standard Manageability, Intel® PROSet/Wireless and Intel® Killer™ Wi-Fi software may allow escalation of privilege, denial of service, or information disclosure. Intel is releasing firmware updates to mitigate these potential vulnerabilities. (link) Insyde SA-2024001: SMM memory corruption vulnerability could lead to escalating privileges in SMM. (CWE-822). (link)Insyde SA-2024006: [EDK2] FirmwarePerformancePei: Potential UINT32 overflow and subsequent divide by 0. (link)Insyde SA-2024007: IhisiServiceSmm: A vulnerability in the module could allow an attacker to modify UEFI variables. (link)Insyde SA-2024014: IhisiServiceSmm: TcgMor: Potential memory leak vulnerability. (link) Getac Affected Products and Recommendation:1. For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below: 2. The latest version solution is backwards-compatible with the previous version.GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-01167)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809S510Intel Core Ultra Series 123.100.0.42/28/2025https://support.getac.com/Portal/Page/809S41011th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80913th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809A14010th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809B36010th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80912th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809K1208th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80911th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80913th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809V11010th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80912th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809F1108th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80911th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80913th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809UX1010th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80912th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00999/ Intel SA-01071/ Intel SA-01083/ Intel SA-01097/ Intel SA-01166/ All Insyde SAs)Product NameCPUGenerationBIOSVersionBIOSRelease StatusLatest BIOSPlease click on the links below to downloadX60011th Gen CoreR1.12.0705202/28/2025https://support.getac.com/Portal/Page/809S510Intel Core Ultra Series 1R1.03.0705202/28/2025https://support.getac.com/Portal/Page/809S41011th Gen CoreR1.39.0705202/28/2025https://support.getac.com/Portal/Page/80913th Gen CoreR1.07.0705202/28/2025https://support.getac.com/Portal/Page/809A14010th Gen CoreR.1.20.0705202/28/2025https://support.getac.com/Portal/Page/809B36010th Gen CoreR1.36.0705202/28/2025https://support.getac.com/Portal/Page/80912th Gen CoreR1.12.0705202/28/2025https://support.getac.com/Portal/Page/809K1208th Gen CoreR1.21.0705202/28/2025https://support.getac.com/Portal/Page/80911th Gen CoreR1.22.0705202/28/2025https://support.getac.com/Portal/Page/80913th Gen CoreR1.04.0705202/28/2025https://support.getac.com/Portal/Page/809V11010th Gen CoreR1.18.0705202/28/2025https://support.getac.com/Portal/Page/80912th Gen CoreR1.05.0705202/28/2025https://support.getac.com/Portal/Page/809F1108th Gen CoreR1.22.0705202/28/2025https://support.getac.com/Portal/Page/80911th Gen CoreR1.18.0705202/28/2025https://support.getac.com/Portal/Page/80913th Gen CoreR1.05.0705202/28/2025https://support.getac.com/Portal/Page/809UX1010th Gen CoreR1.10.0705202/28/2025https://support.getac.com/Portal/Page/80912th Gen CoreR1.25.0705202/28/2025https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.
Getac Technology Corporation Statement for 2024H1 Security Update
2024/08/23
Getac Technology Corporation Statement for 2024H1 Security Update NOTICE:Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Intel Corporation (“Intel”) / Insyde Software Corp. (“Insyde”) on supported Getac systems. Please refer to the table below to identify fixes for your systems. Release Date: 23rd Aug, 2024Latest Release Date: 23rd Aug, 2024 Summary: Intel SA-01051: A potential security vulnerability in some Intel® Processors may allow information disclosure. Intel is releasing microcode updates to mitigate this potential vulnerability. (link)Intel SA-01046: A potential security vulnerability in some Intel® Processor stream cache mechanisms may allow escalation of privilege. Intel is releasing microcode updates to mitigate this potential vulnerability. (link)Intel SA-00993: Potential security vulnerabilities in some Intel® Ethernet tools and driver install software may allow escalation of privilege. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Intel SA-00982: A potential security vulnerability in some Intel® Processors may allow information disclosure. Intel is releasing a firmware update to mitigate this potential vulnerability. (link)Intel SA-00972: A potential security vulnerability in the bus lock regulator mechanism for some Intel® Processors may allow denial of service. Intel is releasing firmware updates to mitigate this potential vulnerability.(link)Intel SA-00961: A potential security vulnerability in some Intel® Rapid Storage Technology software may allow escalation of privilege. Intel is releasing software updates to mitigate this potential vulnerability. (link)Intel SA-00950: A potential security vulnerability in some Intel® Processors may allow escalation of privilege and/or information disclosure and/or denial of service via local access. Intel is releasing firmware updates to mitigate this potential vulnerability. (link)Intel SA-00947: Potential security vulnerabilities in some Intel® PROSet/Wireless and Intel® Killer™ Wi-Fi software may allow escalation of privilege, information disclosure or denial of service. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Intel SA-00944: A potential security vulnerability in the Intel® Connectivity Performance Suite software for some Intel® Wireless Products may allow information disclosure. Intel is releasing software updates to mitigate this potential vulnerability. (link)Intel SA-00929: A potential security vulnerability in BIOS firmware for some Intel® Processors may allow escalation of privilege. Intel is releasing BIOS updates to mitigate this potential vulnerability. (link)Intel SA-00928: Potential security vulnerabilities in some Intel® Chipset Driver Software may allow escalation of privilege. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Intel SA-00923: Potential security vulnerabilities in the Intel® Converged Security Management Engine (CSME) installer, Intel® Local Manageability Service software and Intel® Server Platform Servcies (SPS) may allow information disclosure, escalation of privilege, or denial of service.(link)Intel SA-00898: A potential security vulnerability in some Intel® Atom® Processors may allow information disclosure. Intel is releasing firmware updates to mitigate this potential vulnerability. (link)Intel SA-00870: A potential security vulnerability in some Intel® Chipset Device Software may allow escalation of privilege. Intel is releasing software updates to mitigate this potential vulnerability. (link)Intel SA-00864: Potential security vulnerabilities in some Intel® Graphics drivers may allow escalation of privilege, denial of service and information disclosure. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Intel SA-00851: Potential security vulnerabilities in some Intel® Thunderbolt™ Declarative Componentized Hardware (DCH) drivers for Windows may allow escalation of privilege, denial of service, and/or information disclosure. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Insyde SA-2023040: IhisiServiceSmm: A vulnerability in the module that could allow an attacker to modify UEFI variables. (link)Insyde SA-2023047: SysPasswordDxe: Cleartext storage of system password could lead to possible information disclosure. (link)Insyde SA-2023048: Upgrade FreeType Build Tool to version 2.13.0. (link)Insyde SA-2023054: AsfSecureBootDxe: Stack buffer overflow vulnerability leading to arbitrary code execution during DXE phase. (link)Insyde SA-2023055: CsmInt10HookSmm: SMM memory corruption vulnerability in SMM driver (SMRAM write). (link)Insyde SA-2023056: IhisiServicesSmm: Arbitrary calls to SetVariable with unsanitized arguments in SMI handler. (link)Insyde SA-2023053: Improper input validation may be exploited via local access. (link)Insyde SA-2023059: IH2O-0802-2301 Code change to accommondate OpenSSL 1.1.1v (link)Insyde SA-2023031: VU#275256 Vulnerabilities in EDK2 Reference implementation of the UEFI Specification. (link)Insyde SA-2023066: VU#132380 Vulnerabilities in EDK2 NetworkPkg IP stack implementation. (link)Insyde SA-2023067: PnpSmm: Possible out of bounds in SMM communication buffer, leading to tampering. (link) Getac Affected Products and Recommendation:1. For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below: 2. The latest version solution is backwards-compatible with the previous version.GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00961)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX5007th Gen Core17.9.1.10097/31/2024https://support.getac.com/Portal/Page/809K1208th Gen Core17.9.1.10097/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00947)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadS41011th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/80913th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/809A14010th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/809B36010th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/80912th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/809V11010th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/80912th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/809F1108th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/80911th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00944)Product NameCPUGenerationSoftwareVersionSoftwareRelease StatusLatest Intel ® Connectivity Performance Suite softwarePlease click on the links below to downloadB36012th Gen Core3.1023.1118.17/31/2024https://support.getac.com/Portal/Page/809V11012th Gen Core3.1023.1118.17/31/2024https://support.getac.com/Portal/Page/809UX1012th Gen Core3.1023.1118.17/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00993)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen Core2.1.4.37/31/2024https://support.getac.com/Portal/Page/809X5007th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/809S41011th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/80913th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/809A14010th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/809B36010th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/80912th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/809K1208th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/80911th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/809V11010th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/80912th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/809F1108th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/80911th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/809UX1010th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/80912th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00928 / Intel SA-00870)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809X5007th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809S41011th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80913th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809A14010th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809B36010th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80912th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809K1208th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80911th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809V11010th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80912th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809F1108th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80911th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809UX1010th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80912th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00923)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809X5007th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809S41011th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80913th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809A14010th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809B36010th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80912th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809K1208th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80911th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809V11010th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80912th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809F1108th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80911th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809UX1010th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80912th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00864)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809S41011th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809B36012th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809K12011th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809V11012th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809F11011th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809UX1012th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00851)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809S41011th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809B36012th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809K12011th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809V11012th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809F11011th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809UX1012th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-01046/ Intel SA-00982/ Intel SA-00972/ Intel SA-00950/ Intel SA-00929/ Intel SA-00898/ All Insyde SAs)Product NameCPUGenerationBIOSVersionBIOSRelease StatusLatest BIOSPlease click on the links below to downloadX60011th Gen CoreR1.08.0705208/13/2024https://support.getac.com/Portal/Page/809X5007th Gen CoreR1.34.0705208/13/2024https://support.getac.com/Portal/Page/809S41011th Gen CoreR1.38.0705208/13/2024https://support.getac.com/Portal/Page/80913th Gen CoreR1.05.0705208/13/2024https://support.getac.com/Portal/Page/809A14010th Gen CoreR1.18.0705208/13/2024https://support.getac.com/Portal/Page/809B36010th Gen CoreR1.35.0705208/13/2024https://support.getac.com/Portal/Page/80912th Gen CoreR1.10.0705208/13/2024https://support.getac.com/Portal/Page/809K1208th Gen CoreR1.20.0705208/13/2024https://support.getac.com/Portal/Page/80911th Gen CoreR1.21.0705208/13/2024https://support.getac.com/Portal/Page/809V11010th Gen CoreR1.17.0705208/13/2024https://support.getac.com/Portal/Page/80912th Gen CoreR1.04.0705208/13/2024https://support.getac.com/Portal/Page/809F1108th Gen CoreR1.21.0705208/13/2024https://support.getac.com/Portal/Page/80911th Gen CoreR1.17.0705208/13/2024https://support.getac.com/Portal/Page/809UX1010th Gen CoreR1.24.0705208/13/2024https://support.getac.com/Portal/Page/80912th Gen CoreR1.08.0705208/13/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status.Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.