News 1/5
Getac Technology Corporation Statement on Trusted Platform Module Firmware Security Update
2025/10/09
Getac Technology Corporation Statement on Trusted Platform Module Firmware Security Update Notice:Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Infineon Technology Corporation (“Infineon”) to supported Getac systems. Please refer to the table below to identify fixes for your systems. Release Date: 10 Jun, 2025Last Updated: 24 Sep, 2025 Summary: Infineon has informed Getac of a potential vulnerability identified as CVE-2025-2884 in the TPM 2.0 reference implementation code published by the Trusted Computing Group, which may allow an attacker to read up to 65535 bytes past the end of that buffer. The CVE-2025-2884 could result in information disclosure or denial of service of the TPM (link)CVEID: CVE-2025-2884 Getac Affected Products and Recommendations:1. For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below. 2. The latest version solution is backwards-compatible with the previous version. Getac Affected Products and SolutionsProduct NameCPU GenerationTPM FW VersionRelease DateSolution LinkX60011th Gen7.8608 Oct, 2025https://support.getac.com/Service/FileReader/Index?fileid=111871&cateid=100035* Please note that the schedule above is subject to change due to test status. Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.
How to Update TPM Firmware
2025/10/09
ApplicationsThe TPM firmware update is applicable to the following models.Model NameSystem ReleaseX600MP modelUpdate ProceduresPart 1. Create a USB drive for the firmware update.Insert a USB drive.Format the USB drive to FAT32. (The original data on the USB drive will be erased.)Download the IFXTPMWUpd.zip file from download linkDecompress the IFXTPMWUpd.zip file to the USB drive. The snapshot below shows the result.5. Remove the USB drive.Part 2. Update the TPM firmware.NOTE: TPM firmware update will cause loss of all TPM keys and data protected by those keys.Disable BitLocker on Windows OS (Windows 11 Pro and Windows Server 2022). Select Control Panel □ System and Security □ BitLocker Drive Encryption. Turn off BitLocker.System insert USB TPM firmware update diskEnter Boot Manager.- For notebook models, press F10 during POST.- For tablet models, press the Menu hardware button or tap the touchscreen during POST.Select EFI USB Device and press Enter. (On tablet models, the Enter key is the Windows logo hardware button.) This allows EFI to boot from the USB drive containing the TPM firmware update.UEFI boot from USB TPM firmware update diskExecute IFXTPMUpdPlease run this program after the system automatically restartsEnter Boot Manager.- For notebook models, press F10 during POST.- For tablet models, press the Menu hardware button or tap the touchscreen during POST.Select EFI USB Device and press Enter. (On tablet models, the Enter key is the Windows logo hardware button.) This allows EFI to boot from the USB drive containing the TPM firmware update.UEFI boot from USB TPM firmware update diskExecute IFXTPMUpdWait for the TPM firmware update to finishPress power button to power off systemRestart the system.
Getac Technology Corporation Statement for 2024H2 security update.
2025/02/28
Getac Technology Corporation Statement for 2024H2 security update. NOTICE:Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Intel Corporation (“Intel”) / Insyde Software Corp. (“Insyde”) on supported Getac systems. Please refer to the table below to identify fixes for your systems. Release Date: 28th Feb, 2025Latest Release Date: 28th Feb, 2025Summary: This security update is for 2024H2, but during the testing period, issues from 2025Q1 were also partially covered. Please refer to the SAs below for further information. Intel SA-01167: Potential security vulnerabilities in some Intel® PROSet/Wireless WiFi products may allow escalation of privilege or denial of service. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Intel SA-01166: A potential security vulnerability in some Intel® Processors may allow denial of service. Intel is releasing microcode updates to mitigate this potential vulnerability. (link)Intel SA-01097: A potential security vulnerability in some Intel® Processors may allow denial of service. Intel is releasing firmware updates to mitigate this potential vulnerability. (link)Intel SA-01083: A potential security vulnerability in SMI Transfer monitor (STM) may allow escalation of privilege. Intel is releasing microcode updates to mitigate this potential vulnerability. (link)Intel SA-01071: Potential security vulnerabilities in UEFI firmware for some Intel® Processors may allow escalation of privilege, denial of service or information disclosure. Intel is releasing UEFI firmware updates to mitigate these potential vulnerabilities. (link)Intel SA-00999: Potential security vulnerabilities in Intel® Converged Security and Manageability Engine (CSME), Intel® Active Management Technology (AMT), Intel® Standard Manageability, Intel® PROSet/Wireless and Intel® Killer™ Wi-Fi software may allow escalation of privilege, denial of service, or information disclosure. Intel is releasing firmware updates to mitigate these potential vulnerabilities. (link) Insyde SA-2024001: SMM memory corruption vulnerability could lead to escalating privileges in SMM. (CWE-822). (link)Insyde SA-2024006: [EDK2] FirmwarePerformancePei: Potential UINT32 overflow and subsequent divide by 0. (link)Insyde SA-2024007: IhisiServiceSmm: A vulnerability in the module could allow an attacker to modify UEFI variables. (link)Insyde SA-2024014: IhisiServiceSmm: TcgMor: Potential memory leak vulnerability. (link) Getac Affected Products and Recommendation:1. For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below: 2. The latest version solution is backwards-compatible with the previous version.GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-01167)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809S510Intel Core Ultra Series 123.100.0.42/28/2025https://support.getac.com/Portal/Page/809S41011th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80913th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809A14010th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809B36010th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80912th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809K1208th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80911th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80913th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809V11010th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80912th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809F1108th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80911th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80913th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809UX1010th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/80912th Gen Core23.100.0.42/28/2025https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00999/ Intel SA-01071/ Intel SA-01083/ Intel SA-01097/ Intel SA-01166/ All Insyde SAs)Product NameCPUGenerationBIOSVersionBIOSRelease StatusLatest BIOSPlease click on the links below to downloadX60011th Gen CoreR1.12.0705202/28/2025https://support.getac.com/Portal/Page/809S510Intel Core Ultra Series 1R1.03.0705202/28/2025https://support.getac.com/Portal/Page/809S41011th Gen CoreR1.39.0705202/28/2025https://support.getac.com/Portal/Page/80913th Gen CoreR1.07.0705202/28/2025https://support.getac.com/Portal/Page/809A14010th Gen CoreR.1.20.0705202/28/2025https://support.getac.com/Portal/Page/809B36010th Gen CoreR1.36.0705202/28/2025https://support.getac.com/Portal/Page/80912th Gen CoreR1.12.0705202/28/2025https://support.getac.com/Portal/Page/809K1208th Gen CoreR1.21.0705202/28/2025https://support.getac.com/Portal/Page/80911th Gen CoreR1.22.0705202/28/2025https://support.getac.com/Portal/Page/80913th Gen CoreR1.04.0705202/28/2025https://support.getac.com/Portal/Page/809V11010th Gen CoreR1.18.0705202/28/2025https://support.getac.com/Portal/Page/80912th Gen CoreR1.05.0705202/28/2025https://support.getac.com/Portal/Page/809F1108th Gen CoreR1.22.0705202/28/2025https://support.getac.com/Portal/Page/80911th Gen CoreR1.18.0705202/28/2025https://support.getac.com/Portal/Page/80913th Gen CoreR1.05.0705202/28/2025https://support.getac.com/Portal/Page/809UX1010th Gen CoreR1.10.0705202/28/2025https://support.getac.com/Portal/Page/80912th Gen CoreR1.25.0705202/28/2025https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.
Getac Technology Corporation Statement for 2024H1 Security Update
2024/08/23
Getac Technology Corporation Statement for 2024H1 Security Update NOTICE:Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Intel Corporation (“Intel”) / Insyde Software Corp. (“Insyde”) on supported Getac systems. Please refer to the table below to identify fixes for your systems. Release Date: 23rd Aug, 2024Latest Release Date: 23rd Aug, 2024 Summary: Intel SA-01051: A potential security vulnerability in some Intel® Processors may allow information disclosure. Intel is releasing microcode updates to mitigate this potential vulnerability. (link)Intel SA-01046: A potential security vulnerability in some Intel® Processor stream cache mechanisms may allow escalation of privilege. Intel is releasing microcode updates to mitigate this potential vulnerability. (link)Intel SA-00993: Potential security vulnerabilities in some Intel® Ethernet tools and driver install software may allow escalation of privilege. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Intel SA-00982: A potential security vulnerability in some Intel® Processors may allow information disclosure. Intel is releasing a firmware update to mitigate this potential vulnerability. (link)Intel SA-00972: A potential security vulnerability in the bus lock regulator mechanism for some Intel® Processors may allow denial of service. Intel is releasing firmware updates to mitigate this potential vulnerability.(link)Intel SA-00961: A potential security vulnerability in some Intel® Rapid Storage Technology software may allow escalation of privilege. Intel is releasing software updates to mitigate this potential vulnerability. (link)Intel SA-00950: A potential security vulnerability in some Intel® Processors may allow escalation of privilege and/or information disclosure and/or denial of service via local access. Intel is releasing firmware updates to mitigate this potential vulnerability. (link)Intel SA-00947: Potential security vulnerabilities in some Intel® PROSet/Wireless and Intel® Killer™ Wi-Fi software may allow escalation of privilege, information disclosure or denial of service. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Intel SA-00944: A potential security vulnerability in the Intel® Connectivity Performance Suite software for some Intel® Wireless Products may allow information disclosure. Intel is releasing software updates to mitigate this potential vulnerability. (link)Intel SA-00929: A potential security vulnerability in BIOS firmware for some Intel® Processors may allow escalation of privilege. Intel is releasing BIOS updates to mitigate this potential vulnerability. (link)Intel SA-00928: Potential security vulnerabilities in some Intel® Chipset Driver Software may allow escalation of privilege. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Intel SA-00923: Potential security vulnerabilities in the Intel® Converged Security Management Engine (CSME) installer, Intel® Local Manageability Service software and Intel® Server Platform Servcies (SPS) may allow information disclosure, escalation of privilege, or denial of service.(link)Intel SA-00898: A potential security vulnerability in some Intel® Atom® Processors may allow information disclosure. Intel is releasing firmware updates to mitigate this potential vulnerability. (link)Intel SA-00870: A potential security vulnerability in some Intel® Chipset Device Software may allow escalation of privilege. Intel is releasing software updates to mitigate this potential vulnerability. (link)Intel SA-00864: Potential security vulnerabilities in some Intel® Graphics drivers may allow escalation of privilege, denial of service and information disclosure. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Intel SA-00851: Potential security vulnerabilities in some Intel® Thunderbolt™ Declarative Componentized Hardware (DCH) drivers for Windows may allow escalation of privilege, denial of service, and/or information disclosure. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Insyde SA-2023040: IhisiServiceSmm: A vulnerability in the module that could allow an attacker to modify UEFI variables. (link)Insyde SA-2023047: SysPasswordDxe: Cleartext storage of system password could lead to possible information disclosure. (link)Insyde SA-2023048: Upgrade FreeType Build Tool to version 2.13.0. (link)Insyde SA-2023054: AsfSecureBootDxe: Stack buffer overflow vulnerability leading to arbitrary code execution during DXE phase. (link)Insyde SA-2023055: CsmInt10HookSmm: SMM memory corruption vulnerability in SMM driver (SMRAM write). (link)Insyde SA-2023056: IhisiServicesSmm: Arbitrary calls to SetVariable with unsanitized arguments in SMI handler. (link)Insyde SA-2023053: Improper input validation may be exploited via local access. (link)Insyde SA-2023059: IH2O-0802-2301 Code change to accommondate OpenSSL 1.1.1v (link)Insyde SA-2023031: VU#275256 Vulnerabilities in EDK2 Reference implementation of the UEFI Specification. (link)Insyde SA-2023066: VU#132380 Vulnerabilities in EDK2 NetworkPkg IP stack implementation. (link)Insyde SA-2023067: PnpSmm: Possible out of bounds in SMM communication buffer, leading to tampering. (link) Getac Affected Products and Recommendation:1. For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below: 2. The latest version solution is backwards-compatible with the previous version.GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00961)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX5007th Gen Core17.9.1.10097/31/2024https://support.getac.com/Portal/Page/809K1208th Gen Core17.9.1.10097/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00947)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadS41011th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/80913th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/809A14010th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/809B36010th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/80912th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/809V11010th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/80912th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/809F1108th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/80911th Gen Core23.10.0.8 / 23.10.0.2(BT)7/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00944)Product NameCPUGenerationSoftwareVersionSoftwareRelease StatusLatest Intel ® Connectivity Performance Suite softwarePlease click on the links below to downloadB36012th Gen Core3.1023.1118.17/31/2024https://support.getac.com/Portal/Page/809V11012th Gen Core3.1023.1118.17/31/2024https://support.getac.com/Portal/Page/809UX1012th Gen Core3.1023.1118.17/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00993)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen Core2.1.4.37/31/2024https://support.getac.com/Portal/Page/809X5007th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/809S41011th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/80913th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/809A14010th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/809B36010th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/80912th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/809K1208th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/80911th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/809V11010th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/80912th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/809F1108th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/80911th Gen Core12.19.2.567/31/2024https://support.getac.com/Portal/Page/809UX1010th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/80912th Gen Core12.19.2.607/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00928 / Intel SA-00870)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809X5007th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809S41011th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80913th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809A14010th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809B36010th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80912th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809K1208th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80911th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809V11010th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80912th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809F1108th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80911th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809UX1010th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/80912th Gen Core10.1.19627.84237/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00923)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809X5007th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809S41011th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80913th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809A14010th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809B36010th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80912th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809K1208th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80911th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809V11010th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80912th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809F1108th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80911th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809UX1010th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/80912th Gen Core2413.5.68.07/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00864)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809S41011th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809B36012th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809K12011th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809V11012th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809F11011th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809UX1012th Gen Core31.0.101.54457/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00851)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809S41011th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809B36012th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809K12011th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809V11012th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809F11011th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809UX1012th Gen CoreRev917/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-01046/ Intel SA-00982/ Intel SA-00972/ Intel SA-00950/ Intel SA-00929/ Intel SA-00898/ All Insyde SAs)Product NameCPUGenerationBIOSVersionBIOSRelease StatusLatest BIOSPlease click on the links below to downloadX60011th Gen CoreR1.08.0705208/13/2024https://support.getac.com/Portal/Page/809X5007th Gen CoreR1.34.0705208/13/2024https://support.getac.com/Portal/Page/809S41011th Gen CoreR1.38.0705208/13/2024https://support.getac.com/Portal/Page/80913th Gen CoreR1.05.0705208/13/2024https://support.getac.com/Portal/Page/809A14010th Gen CoreR1.18.0705208/13/2024https://support.getac.com/Portal/Page/809B36010th Gen CoreR1.35.0705208/13/2024https://support.getac.com/Portal/Page/80912th Gen CoreR1.10.0705208/13/2024https://support.getac.com/Portal/Page/809K1208th Gen CoreR1.20.0705208/13/2024https://support.getac.com/Portal/Page/80911th Gen CoreR1.21.0705208/13/2024https://support.getac.com/Portal/Page/809V11010th Gen CoreR1.17.0705208/13/2024https://support.getac.com/Portal/Page/80912th Gen CoreR1.04.0705208/13/2024https://support.getac.com/Portal/Page/809F1108th Gen CoreR1.21.0705208/13/2024https://support.getac.com/Portal/Page/80911th Gen CoreR1.17.0705208/13/2024https://support.getac.com/Portal/Page/809UX1010th Gen CoreR1.24.0705208/13/2024https://support.getac.com/Portal/Page/80912th Gen CoreR1.08.0705208/13/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status.Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.
Getac Technology Corporation Statement for 2023H2 security update
2023/12/29
Getac Technology Corporation Statement for 2023H2 security update NOTICE:1. Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Intel Corporation (“Intel”) / Insyde Software Corp. (“Insyde”) on supported Getac systems. Please refer to the table below to identify fixes for your systems.2. A security vulnerability for various Getac products with UEFI has been identified by third-party researcher, Eclypsium Inc. (“Eclypsium”). The vulnerability may allow an arbitrary code execution during boot while secure boot is on. Getac has released BIOS updates for the affected Getac products and recommends our users to update to the latest version. Getac hereby appreciates Eclypsium for their effort in identifying and bringing the issue to our attention. Release Date: 29th Dec, 2023Latest Release Date: Updated: 29th Dec, 2023 Summary: Intel SA-00924: Potential security vulnerabilities in the BIOS firmware for some Intel® Processors may allow escalation of privilege or denial of service. Intel is releasing BIOS updates to mitigate these potential vulnerabilities. (link)Intel SA-00828: A potential security vulnerability in some Intel® Processors may allow information disclosure. Intel is releasing firmware updates and an optional software sequence to mitigate this potential vulnerability. (link)Intel SA-00813: Potential security vulnerabilities in the BIOS firmware for some Intel® Processors may allow escalation of privilege, information disclosure or denial of service. Intel is releasing firmware updates to mitigate these potential vulnerabilities. (link)Intel SA-00783: Potential security vulnerabilities in the Intel® Converged Security Management Engine (CSME), Active Management Technology (AMT) and Intel® Standard Manageability software may allow escalation of privilege or denial of service. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)Intel SA-00766: Potential security vulnerabilities in some Intel® PROSet/Wireless WiFi and Killer™ WiFi products may allow escalation of privilege or denial of service. Intel is releasing firmware and software updates to mitigate these potential vulnerabilities. (link)Insyde SA-2023052: SystemFirmwareManagementRuntimeDxe: potential arbitrary code execution in the DXE phase (link)Insyde SA-2023045: TrEEConfigDriver: Vulnerable devices can report false TPM PCR values masking malware activity. (link)Insyde SA-2023050: Secure Boot Security Feature Bypass Vulnerability. (link)Insyde SA-2023047: SysPasswordDxe: Cleartext storage of system password could lead to possible information disclosure. (link)Insyde SA-2023039: FvbServicesRuntimeDxe: Exposes an SMI handler that allows an attacker to interact with the SPI flash. (link)Insyde SA-2023038: FDM TOCTOU access after measurement allows redirected code execution. (link)Insyde SA-2023036: MeSetup UEFI variable may be overwritten and causes DOS attacks. (link)Insyde SA-2023034: Insyde Setup EFI Variable Lock Bypass Vulnerability. (link)Insyde SA-2023026: [EDK2] Empty TPM Platform Auth. (link)Insyde SA-2023018: The CapsuleIFWUSmm driver does not check the return value which may cause memory leak. (link)Insyde SA-2023003: DMA attacks on the IHISI command buffer could cause TOCTOU issues which could lead to corruption of SMRAM and escalation of privileges. (link) Getac Affected Products and Recommendation:1. For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below: 2. The latest version solution is backwards-compatible with the previous version.GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00766)Product NameCPUGenerationDriverVersionDriverRelease StatusLatest DriverPlease click on the links below to downloadX60011th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/809S4108th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/80911th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/809A14010th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/809B36010th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/80912th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/809K12011th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/809V11010th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/80912th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/809F11011th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/809UX108th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/80910th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/80912th Gen Core23.101/31/2024https://support.getac.com/Portal/Page/809T800CHT23.101/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00783)Product NameCPUGenerationME FWVersionME FWRelease StatusLatest ME FWPlease click on the links below to downloadX60011th Gen Core15.0.45.24111/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111060&cateid=100035X5007th Gen Core11.8.94.44941/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111055&cateid=100035S4108th Gen Core12.0.94.23801/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111057&cateid=10003511th Gen Core15.0.45.24111/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111059&cateid=100035A1406th Gen Core11.8.94.44941/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111054&cateid=10003510th Gen Core14.1.70.22281/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111058&cateid=100035B3008th Gen Core11.8.94.44941/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111054&cateid=100035B36010th Gen Core14.1.70.22281/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111058&cateid=10003512th Gen Core16.1.27.21761/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111061&cateid=100035K1208th Gen Core11.8.94.44941/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111054&cateid=10003511th Gen Core15.0.45.24111/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111059&cateid=100035V1108th Gen Core12.0.94.23801/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111057&cateid=10003510th Gen Core14.1.70.22281/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111058&cateid=10003512th Gen Core16.1.27.21761/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111061&cateid=100035F1108th Gen Core12.0.94.23801/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111057&cateid=10003511th Gen Core15.0.45.24111/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111059&cateid=100035UX108th Gen Core12.0.94.23801/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111057&cateid=10003510th Gen Core14.1.70.22281/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111058&cateid=10003512th Gen Core16.1.27.2171/31/2024https://support.getac.com/Service/FileReader/Index?fileid=111061&cateid=100035* Please note that the schedule above is subject to change due to the test status. GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00813/ Intel SA-00828/ Intel SA-00924/All Insyde SAs )Product NameCPUGenerationBIOSVersionBIOSRelease StatusLatest BIOSPlease click on the links below to downloadX60011th Gen CoreR1.05.0705201/31/2024https://support.getac.com/Portal/Page/809X5007th Gen CoreR1.32.0705201/31/2024https://support.getac.com/Portal/Page/809S4107th & 8th Gen Core (KBL)R1.31.0705201/31/2024https://support.getac.com/Portal/Page/8098th Gen CoreR1.28.0705201/31/2024https://support.getac.com/Portal/Page/80911th Gen CoreR1.35.0705201/31/2024https://support.getac.com/Portal/Page/80913th Gen CoreR1.02.0705201/31/2024https://support.getac.com/Portal/Page/809A1406th Gen CoreR1.24.0705201/31/2024https://support.getac.com/Portal/Page/80910th Gen CoreR1.16.0705291/31/2024https://support.getac.com/Portal/Page/809B3008th Gen CoreR1.19.0705201/31/2024https://support.getac.com/Portal/Page/809B36010th Gen CoreR1.32.0705201/31/2024https://support.getac.com/Portal/Page/80912th Gen CoreR1.06.0705201/31/2024https://support.getac.com/Portal/Page/809K1208th Gen CoreR1.19.0705201/31/2024https://support.getac.com/Portal/Page/80911th Gen CoreR1.19.0705201/31/2024https://support.getac.com/Portal/Page/809V1107th Gen CoreR1.22.0705201/31/2024https://support.getac.com/Portal/Page/8098th Gen CoreR1.17.0705201/31/2024https://support.getac.com/Portal/Page/80910th Gen CoreR1.15.0705201/31/2024https://support.getac.com/Portal/Page/80912th Gen CoreR1.01.0705201/31/2024https://support.getac.com/Portal/Page/809F1107th Gen CoreR1.27.0705201/31/2024https://support.getac.com/Portal/Page/8098th Gen CoreR1.20.0705201/31/2024https://support.getac.com/Portal/Page/80911th Gen CoreR1.14.0705201/31/2024https://support.getac.com/Portal/Page/809UX108th Gen CoreR1.21.0705201/31/2024https://support.getac.com/Portal/Page/80910th Gen CoreR1.22.0705201/31/2024https://support.getac.com/Portal/Page/80912th Gen CoreR1.06.0705201/31/2024https://support.getac.com/Portal/Page/809T800CHT T4R1.31.0705201/31/2024https://support.getac.com/Portal/Page/809EX80CHT T3R1.10.0705201/31/2024https://support.getac.com/Portal/Page/809* Please note that the schedule above is subject to change due to the test status. Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.