News 1/5
Getac System Maintenance Notice
2026/03/25
【Getac System Maintenance Notice】Temporary Unavailability of the Getac “Service & Repair” SystemMaintenance Start Time: March 25, 2026, 10:00 (GMT+8)Dear Valued Customers,Due to an unexpected system irregularity, the “Service & Repair” system on the Getac support website (support.getac.com) is currently undergoing emergency maintenance, and related functions are temporarily unavailable.Our technical team has already initiated immediate troubleshooting and is actively working to restore system stability and functionality. During this maintenance period, you may encounter the following issues:Inability to log in or submit repair requestsInability to check repair statusCertain repair-related features failing to load or operate normallyWe will restore full service as soon as the maintenance is completed and will provide an update once the system is back online.If you require urgent repair assistance or support during this time, please contact our customer service team:GetacSupport_Global@getac.comGetacService_EU@getac.comWe sincerely apologize for any inconvenience this may cause and greatly appreciate your patience and understanding. Getac remains committed to delivering stable, secure, and high‑quality services.Getac Technology CorporationDate: March 25, 2026 【Getac 系統維護公告】【系統維護公告】 Getac「Service & Repair」維修服務系統暫時無法使用Maintenance Start Time: March 25, 2026, 10:00 (GMT+8)親愛的客戶您好:Getac 因系統偵測到異常狀況,位於 support.getac.com 網站中的 「Service & Repair」維修服務系統 目前正進行 緊急維護作業,相關功能將暫時無法提供使用。我們的技術團隊已在第一時間介入處理,積極進行系統修復與穩定化作業,以確保服務品質與資料安全。 在維護期間,您可能會遇到以下情形:無法登入或提交維修申請無法查詢維修進度部分維修相關功能無法正常顯示或操作我們預計將於維護作業完成後,第一時間恢復所有服務,並另行發布更新通知。若您有緊急維修需求或需要協助,請透過以下方式聯繫我們的客服團隊:GetacSupport_Global@getac.comGetacService_EU@getac.com對於此狀況造成的不便,我們深表歉意,也感謝您的耐心與理解。 Getac 將持續致力於提供穩定、安全且高品質的服務。Getac Technology Corporation 日期:2026 年 3 月 25 日
Microsoft Secure Boot Certificate Transition (2023 CA) and BlackLotus Mitigation
2026/02/11
請參考以下連結以取得最新資訊。Microsoft 安全開機憑證過渡 (2023 CA) 與 BlackLotus 緩解措施|Getac
Getac Technology Corporation Statement for 2025H2 security update
2025/12/12
Veuillez consulter les liens suivants pour obtenir des informations mises à jour.https://www.getac.com/intl/help-support/security-update/
How to Update TPM Firmware
2025/10/09
ApplicationsThe TPM firmware update is applicable to the following models.Model NameSystem ReleaseX600MP modelUpdate ProceduresPart 1. Create a USB drive for the firmware update.Insert a USB drive.Format the USB drive to FAT32. (The original data on the USB drive will be erased.)Download the IFXTPMWUpd.zip file from download linkDecompress the IFXTPMWUpd.zip file to the USB drive. The snapshot below shows the result.5. Remove the USB drive.Part 2. Update the TPM firmware.NOTE: TPM firmware update will cause loss of all TPM keys and data protected by those keys.Disable BitLocker on Windows OS (Windows 11 Pro and Windows Server 2022). Select Control Panel □ System and Security □ BitLocker Drive Encryption. Turn off BitLocker.System insert USB TPM firmware update diskEnter Boot Manager.- For notebook models, press F10 during POST.- For tablet models, press the Menu hardware button or tap the touchscreen during POST.Select EFI USB Device and press Enter. (On tablet models, the Enter key is the Windows logo hardware button.) This allows EFI to boot from the USB drive containing the TPM firmware update.UEFI boot from USB TPM firmware update diskExecute IFXTPMUpdPlease run this program after the system automatically restartsEnter Boot Manager.- For notebook models, press F10 during POST.- For tablet models, press the Menu hardware button or tap the touchscreen during POST.Select EFI USB Device and press Enter. (On tablet models, the Enter key is the Windows logo hardware button.) This allows EFI to boot from the USB drive containing the TPM firmware update.UEFI boot from USB TPM firmware update diskExecute IFXTPMUpdWait for the TPM firmware update to finishPress power button to power off systemRestart the system.
Getac Technology Corporation Statement on Trusted Platform Module Firmware Security Update
2025/10/09
Getac Technology Corporation Statement on Trusted Platform Module Firmware Security Update Notice:Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Infineon Technology Corporation (“Infineon”) to supported Getac systems. Please refer to the table below to identify fixes for your systems. Release Date: 10 Jun, 2025Last Updated: 24 Sep, 2025 Summary: Infineon has informed Getac of a potential vulnerability identified as CVE-2025-2884 in the TPM 2.0 reference implementation code published by the Trusted Computing Group, which may allow an attacker to read up to 65535 bytes past the end of that buffer. The CVE-2025-2884 could result in information disclosure or denial of service of the TPM (link)CVEID: CVE-2025-2884 Getac Affected Products and Recommendations:1. For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below. 2. The latest version solution is backwards-compatible with the previous version. Getac Affected Products and SolutionsProduct NameCPU GenerationTPM FW VersionRelease DateSolution LinkX60011th Gen7.8608 Oct, 2025https://support.getac.com/Service/FileReader/Index?fileid=111871&cateid=100035* Please note that the schedule above is subject to change due to test status. Getac Disclaimer:All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.