
Product
Support
Support
2020.2 INTEL PLATFORM UPDATE (IPU)
Intel 2020.2 IPU covering Intel® CSME, SPS, TXE, AMT, ISM & DAL updates, Intel® Firmware (BIOS) updates, Intel® Processor Microcode (MCU) updates | ||||||||||||||||||||||||||||||||||||||||||
Fujitsu Communication | ||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||
Advisory Description | ||||||||||||||||||||||||||||||||||||||||||
INTEL-SA-00391: 2020.2 IPU – Intel® CSME, SPS, TXE, AMT, ISM & DAL Advisory | ||||||||||||||||||||||||||||||||||||||||||
Multiple potential security vulnerabilities in Intel® Converged Security and Management Engine (Intel® CSME), Server Platform Services (Intel® SPS), Trusted Execution Engine (Intel® TXE), Intel® Active Management Technology (Intel® AMT) (including Intel® Standard Manageability (ISM)) and Intel® Dynamic Application Loader (Intel® DAL) may allow a denial of service, information disclosure or an escalation of privilege. The detailed description of the vulnerabilities with at least a medium, high or critical CVSS base score is as follows:
Vulnerabilities described in CVE-2020-12304 and CVE-2020-12354 address Intel® DAL SDK and Intel® AMT SDK respectively. Mitigation is at the discretion of the end user. The Intel® AMT SDK is available for download at Intel. The vulnerability described in CVE-2020-12355, addressing the Replay Protected Memory Block (RPMB) protocol in Intel® TXE, is further referenced in the Carnegie Mellon University SEI CERT Coordination Center note VU#231329. | ||||||||||||||||||||||||||||||||||||||||||
Potential Impact: | ||||||||||||||||||||||||||||||||||||||||||
According to the information provided the potential impact of INTEL-SA-00391 is: Denial of Service, Information Disclosure, Privilege Escalation | ||||||||||||||||||||||||||||||||||||||||||
INTEL-SA-00358: 2020.2 IPU – Intel® Firmware (BIOS) Advisory | ||||||||||||||||||||||||||||||||||||||||||
Multiple potential security vulnerabilities in BIOS firmware for Intel® Processors may allow a denial of service and/or an escalation of privilege. The detailed description of the vulnerabilities with at least a low, medium, high or critical CVSS base score is as follows:
| ||||||||||||||||||||||||||||||||||||||||||
Potential Impact: | ||||||||||||||||||||||||||||||||||||||||||
According to the information provided the potential impact of INTEL-SA-00358 is: Denial of Service, Privilege Escalation | ||||||||||||||||||||||||||||||||||||||||||
INTEL-SA-00381: 2020.2 IPU – Intel® Fast forward Store Predictor (FFSP) and Vector Register Leakage-Active (VRLA) Advisory | ||||||||||||||||||||||||||||||||||||||||||
Multiple potential security vulnerabilities in some Intel® Processors may allow information disclosure. The detailed description of the vulnerabilities with at least a low, medium, high or critical CVSS base score is as follows:
The audience may please refer to further publications by manufacturer Intel® on the 2020.2 IPU – Intel® Fast forward Store Predictor (FFSP) and Vector Register Leakage-Active (VRLA) Advisory, such as the corresponding article IPAS: Security Advisories for November 2020, for additional technical details about FFSP and VRLA. | ||||||||||||||||||||||||||||||||||||||||||
Potential Impact: | ||||||||||||||||||||||||||||||||||||||||||
According to the information provided the potential impact of INTEL-SA-00381 is: Information Disclosure | ||||||||||||||||||||||||||||||||||||||||||
INTEL-SA-00389: 2020.2 IPU – Intel® Running Average Power Limit (RAPL) Advisory | ||||||||||||||||||||||||||||||||||||||||||
Multiple potential security vulnerabilities in the Intel® Running Average Power Limit (RAPL) interface may allow information disclosure. The detailed description of the vulnerabilities with at least a medium, high or critical CVSS base score is as follows:
The audience may please refer to further publications by manufacturer Intel® on the 2020.2 IPU – Intel® Running Average Power Limit (RAPL) Advisory, such as the corresponding article IPAS: Security Advisories for November 2020, for additional technical details about RAPL. The Running Average Power Limit (RAPL) issue may also be widely known as PLATYPUS. | ||||||||||||||||||||||||||||||||||||||||||
Potential Impact: | ||||||||||||||||||||||||||||||||||||||||||
According to the information provided the potential impact of INTEL-SA-00389 is: Information Disclosure | ||||||||||||||||||||||||||||||||||||||||||
2020.2 IPU – Intel® Processor Microcode (MCU) and Intel® Firmware (BIOS) Functional Updates | ||||||||||||||||||||||||||||||||||||||||||
Additionally, multiple functional updates took place in Intel® Processor Microcode (MCU), affecting products / architectures CLX, SKX, CFL, CFL-S, Grantley HSX EP C0, SKL, KBL, WHL, AML, ICL and LKF, referring to:
Additionally, multiple functional updates took place in BIOS and CSME/SPS, which were updated on some SKU’s to address their sightings, affecting products / architectures CLX, SKX, SKX-D, Xeon E Mehlow, CFL, ICL client, SKL client, referring to:
There were no additional CVEs assigned to these FUNCTIONAL updates. | ||||||||||||||||||||||||||||||||||||||||||
CVE Reference (INTEL-SA-00391, INTEL-SA-00358, INTEL-SA-00381, INTEL-SA-00389) | ||||||||||||||||||||||||||||||||||||||||||
INTEL-SA-00391: 2020.2 IPU – Intel® CSME, SPS, TXE, AMT, ISM & DAL Advisory | ||||||||||||||||||||||||||||||||||||||||||
The description of the vulnerabilities with at least a medium, high or critical CVSS base score is as follows: | ||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||
INTEL-SA-00358: 2020.2 IPU – Intel® Firmware (BIOS) Advisory | ||||||||||||||||||||||||||||||||||||||||||
The description of the vulnerabilities with at least a low, medium, high or critical CVSS base score is as follows: | ||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||
INTEL-SA-00381: 2020.2 IPU – Intel® Fast forward Store Predictor (FFSP) and Vector Register Leakage-Active (VRLA) Advisory | ||||||||||||||||||||||||||||||||||||||||||
The description of the vulnerabilities with at least a low, medium, high or critical CVSS base score is as follows: | ||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||
INTEL-SA-00389: 2020.2 IPU – Intel® Running Average Power Limit (RAPL) Advisory | ||||||||||||||||||||||||||||||||||||||||||
The description of the vulnerabilities with at least a medium, high or critical CVSS base score is as follows: | ||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||
Links for Technical Details | ||||||||||||||||||||||||||||||||||||||||||
Technical details of the potential security vulnerabilities and functional issues are documented online:
| ||||||||||||||||||||||||||||||||||||||||||
Affection and Remediation | ||||||||||||||||||||||||||||||||||||||||||
Affected Fujitsu Products | ||||||||||||||||||||||||||||||||||||||||||
A number of Fujitsu products are affected by these vulnerabilities. Fujitsu is working to distribute updates for all affected products that are currently supported. Older systems that are no longer supported will not be updated. An overview of the affected Client Computing Devices (e.g. CELSIUS, ESPRIMO, FUTRO, LIFEBOOK, STYLISTIC) and Server products (PRIMERGY and PRIMEQUEST) can be found here: List of affected Fujitsu products (APL) This page will be updated regularly as soon as new information is available. Besides a list of affected systems, also more detailed advice will follow. NOTE: Intel® Security Advisory INTEL-SA-00404 is not officially part of this 2020.2 Intel Platform Update (IPU). However, certain updates were issued along with the 2020.1 Intel Platform Update (IPU) and some will be provided along with updates for this 2020.2 Intel Platform Update (IPU). Intel® Security Advisory INTEL-SA-00356 is not officially part of this 2020.2 Intel Platform Update (IPU). However, updates will also be provided along with updates for this 2020.2 Intel Platform Update (IPU), except for non-affected CVE-2020-8671. Intel® Security Advisory INTEL-SA-00403 is not officially part of this 2020.2 Intel Platform Update (IPU). However, updates will also be provided in the same period as the updates for this 2020.2 Intel Platform Update (IPU). Intel® Security Advisories INTEL-SA-00439, INTEL-SA-00431, INTEL-SA-00430, INTEL-SA-00429, INTEL-SA-00424, INTEL-SA-00405 and INTEL-SA-00347 are not part of this 2020.2 Intel Platform Update (IPU). Further, Fujitsu is not affected by any of these Intel® Security Advisories. | ||||||||||||||||||||||||||||||||||||||||||
Recommended Steps for Remediation | ||||||||||||||||||||||||||||||||||||||||||
Remediation via BIOS Update | ||||||||||||||||||||||||||||||||||||||||||
Step 1: Determine whether you have an affected system. | ||||||||||||||||||||||||||||||||||||||||||
Refer to the list of affected Fujitsu products (APL). This list is updated regularly. Before proceeding, please check the expected availability of the relevant BIOS update package. | ||||||||||||||||||||||||||||||||||||||||||
Step 2: Download and install the BIOS update package. | ||||||||||||||||||||||||||||||||||||||||||
To download and install the BIOS update package, please go to the Fujitsu Technical Support page and follow these steps:
| ||||||||||||||||||||||||||||||||||||||||||
Remediation via Management Engine (ME) Update | ||||||||||||||||||||||||||||||||||||||||||
Updating the ME firmware is an alternative to updating the BIOS and used when a BIOS update is not planned. However, it may only be available for some specific Client Computing Devices. | ||||||||||||||||||||||||||||||||||||||||||
Step 1: Determine whether you have an affected system. | ||||||||||||||||||||||||||||||||||||||||||
Refer to the list of affected Fujitsu products (APL). This list is updated regularly. Before proceeding, please check the expected availability of the relevant ME update package. | ||||||||||||||||||||||||||||||||||||||||||
Step 2: Download the ME update package. | ||||||||||||||||||||||||||||||||||||||||||
To download the ME update package, please go to the Fujitsu Technical Support page and follow these steps:
| ||||||||||||||||||||||||||||||||||||||||||
Step 3: Preparation. | ||||||||||||||||||||||||||||||||||||||||||
After downloading the .zip file, containing the ME Firmware Update Pack, extract all files/directories/subdirectories in the Firmware.ME directory (\Firmware.ME) of the .zip file to the desired directory on the hard drive. | ||||||||||||||||||||||||||||||||||||||||||
Step 4: ME Update Procedure. | ||||||||||||||||||||||||||||||||||||||||||
The "Firmware.ME" directory contains the ME update files which can be used in Windows environment. Run "update.bat" in Windows cmd environment with administrative privileges to start the ME flash procedure. Please choose 32-bit or 64-bit directory if using a Windows 32-bit or a Windows 64-bit installation. | ||||||||||||||||||||||||||||||||||||||||||
Hints:
| ||||||||||||||||||||||||||||||||||||||||||
Links for Software Security Updates | ||||||||||||||||||||||||||||||||||||||||||
Vendor Fujitsu support.ts.fujitsu.com | ||||||||||||||||||||||||||||||||||||||||||
Vendor Intel security-center.intel.com/ | ||||||||||||||||||||||||||||||||||||||||||
Further Information | ||||||||||||||||||||||||||||||||||||||||||
Contact Details | ||||||||||||||||||||||||||||||||||||||||||
Should you require any further security-related assistance, please contact: G02D-PSIRT@ts.fujitsu.com. | ||||||||||||||||||||||||||||||||||||||||||
Legal Statement | ||||||||||||||||||||||||||||||||||||||||||
Fujitsu does not manufacture the affected microprocessors, that Fujitsu buys from third party suppliers and integrates into its products. Therefore, this communication is based on the information and recommendations Fujitsu has received from the third party suppliers of the affected microprocessors. Fujitsu does not warrant that this communication is applicable or complete for all customers and all situations. Fujitsu recommends that customers determine the applicability of this communication to their individual situation and take appropriate measures. Fujitsu is not liable for any damages or other negative effects, resulting from customers’ use of this communication. All details of this communication are provided "as is" without any warranty or guarantee. Fujitsu reserves the right to change or update this communication at any time. Websites of other companies referred to in this communication are the sole responsibility of such other companies. Fujitsu does not assume any liability with respect to any information and materials provided by its suppliers, including on such websites. Designations may be protected by trademarks and/or copyrights of Fujitsu or the respective owners, the use of which by third parties for their own purposes may infringe the rights of such owners. |