
Produkt
Support
Support
Intel® 2019.1 Quarterly Security Release | ||||||||||||||||||||||||||||
Intel 2019.1 QSR covering Intel® CSME, SPS, TXE, & AMT updates, Intel® Firmware (UEFI) updates and Intel® Processor Microcode (MCU) updates | ||||||||||||||||||||||||||||
Fujitsu Communication | ||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||
Advisory Description | ||||||||||||||||||||||||||||
Intel® CSME, SPS, TXE and Intel® AMT 2019.1 QSR Advisory (INTEL-SA-00213) | ||||||||||||||||||||||||||||
Multiple potential security vulnerabilities in Intel® Converged Security and Management Engine (Intel® CSME), Server Platform Services (SPS), Trusted Execution Engine (TXE) and Intel® Active Management Technology (Intel® AMT) may allow users to potentially cause a denial of service, disclose information or an escalation of privilege. The detailed description of the vulnerabilities with high or critical CVSS base scores is as follows:
| ||||||||||||||||||||||||||||
Potential Impact: | ||||||||||||||||||||||||||||
According to the information provided the potential impact of INTEL-SA-00213 is: Denial of Service, Information Disclosure, Privilege Escalation | ||||||||||||||||||||||||||||
Intel® Firmware (UEFI) 2019.1 QSR Advisory (INTEL-SA-00223) | ||||||||||||||||||||||||||||
Multiple potential security vulnerabilities in Intel® firmware (UEFI) may allow users to potentially cause a denial of service or an escalation of privilege. The detailed description of the vulnerabilities with high CVSS base scores is as follows:
| ||||||||||||||||||||||||||||
Potential Impact: | ||||||||||||||||||||||||||||
According to the information provided the potential impact of INTEL-SA-00223 is: Denial of Service, Privilege Escalation | ||||||||||||||||||||||||||||
Intel® Processor Microcode (MCU) Updates (INTEL-SA-00233) | ||||||||||||||||||||||||||||
Multiple potential security vulnerabilities in Intel® processor microcode (MCU) may allow information disclosure. The detailed description of the vulnerabilities, known as Microarchitectural Data Sampling (MDS) or "ZombieLoad", with medium or high CVSS base scores is as follows:
MCUs will work in conjunction with updates to Operating System (OS) and Virtual Machine Manage (VMM) software provided by others. Where utilized, Intel® SGX attestation services will report whether the MCU update is applied, beginning June 11, 2019. | ||||||||||||||||||||||||||||
Potential Impact: | ||||||||||||||||||||||||||||
According to the information provided the potential impact of INTEL-SA-00233 is: Information Disclosure | ||||||||||||||||||||||||||||
Additionally, multiple potential functional issues in Intel® processor microcode (MCU) may cause unpredictable system behavior, platform stability problems or could result in a platform reset. The detailed description of the issues (no CVEs and no CVSS base scores – FUNCTIONAL issue) is as follows: Amber Lake Y; Broadwell H,U,Y; Coffee Lake H,S,U; KabyLake G,H,S,U,X,Y,RU; Skylake H,S,U/Y,X; Whiskey Lake U Under complex microarchitectural conditions, software using Intel® TSX (Transactional Synchronization Extensions) may result in unpredictable system behavior. Intel® has only seen this under synthetic testing conditions. Intel® is not aware of any commercially available software exhibiting this behavior. Amber Lake Y; Broadwell H,U,Y; Coffee Lake H,S,U; Haswell H,U; KabyLake G,H,S,U,X,Y,RU; Skylake H,S,U/Y,X; Whiskey Lake U "MCE" - Addresses potential platform stability issues which could result in platform reset and MCE (IA32_MCi_STATUS.MSCOD=00FH), (IA32_MCI_ STATUS. MCACOD=0150H). | ||||||||||||||||||||||||||||
CVE Reference (INTEL-SA-00213, INTEL-SA-00223, INTEL-SA-00233) | ||||||||||||||||||||||||||||
Intel® CSME, SPS, TXE and Intel® AMT 2019.1 QSR Advisory (INTEL-SA-00213) | ||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||
Intel® Intel® Firmware (UEFI) 2019.1 QSR Advisory (INTEL-SA-00223) | ||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||
Intel® Processor Microcode (MCU) Updates (INTEL-SA-00233) | ||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||
Links for Technical Details | ||||||||||||||||||||||||||||
Technical details of the potential security vulnerabilities and functional issues are documented online:
| ||||||||||||||||||||||||||||
Affection and Remediation | ||||||||||||||||||||||||||||
Affected Fujitsu Products | ||||||||||||||||||||||||||||
A number of Fujitsu products are affected by these vulnerabilities. Fujitsu is working to distribute patches for all affected products that are currently supported. Older systems that are no longer supported will not be patched. An overview of the affected Client Computing Devices (e.g. CELSIUS, ESPRIMO, FUTRO, LIFEBOOK, STYLISTIC) and Server products (PRIMERGY and PRIMEQUEST) can be found here: List of affected Fujitsu products (APL) This page will be updated regularly as soon as new information is available. Besides a list of affected systems, also more detailed advice will follow. | ||||||||||||||||||||||||||||
Recommended Steps for Remediation | ||||||||||||||||||||||||||||
Remediation via BIOS Update | ||||||||||||||||||||||||||||
Step 1: Determine whether you have an affected system. | ||||||||||||||||||||||||||||
Refer to the list of affected Fujitsu products (APL). This list is updated regularly. Before proceeding, please check the expected availability of the relevant BIOS update package. | ||||||||||||||||||||||||||||
Step 2: Download and install the BIOS update package. | ||||||||||||||||||||||||||||
To download and install the BIOS update package, please go to the Fujitsu Technical Support page and follow these steps:
| ||||||||||||||||||||||||||||
Remediation via Management Engine (ME) Update | ||||||||||||||||||||||||||||
Step 1: Determine whether you have an affected system. | ||||||||||||||||||||||||||||
Refer to the list of affected Fujitsu products (APL). This list is updated regularly. Before proceeding, please check the expected availability of the relevant ME update package. | ||||||||||||||||||||||||||||
Step 2: Download the ME update package. | ||||||||||||||||||||||||||||
To download the ME update package, please go to the Fujitsu Technical Support page and follow these steps:
| ||||||||||||||||||||||||||||
Step 3: Preparation. | ||||||||||||||||||||||||||||
After downloading the .zip file, containing the ME Firmware Update Pack, extract all files/directories/subdirectories in the Firmware.ME directory (\Firmware.ME) of the .zip file to the desired directory on the hard drive. | ||||||||||||||||||||||||||||
Step 4: ME Update Procedure. | ||||||||||||||||||||||||||||
The "Firmware.ME" directory contains the ME update files which can be used in Windows environment. Run "update.bat" in Windows cmd environment with administrative privileges to start the ME flash procedure. Please choose 32-bit or 64-bit directory if using a Windows 32-bit or a Windows 64-bit installation. | ||||||||||||||||||||||||||||
Hints:
| ||||||||||||||||||||||||||||
Links for Software Security Updates | ||||||||||||||||||||||||||||
Vendor Fujitsu support.ts.fujitsu.com | ||||||||||||||||||||||||||||
Vendor Intel security-center.intel.com/ | ||||||||||||||||||||||||||||
Further Information | ||||||||||||||||||||||||||||
Contact Details | ||||||||||||||||||||||||||||
Should you require any further security-related assistance, please contact: G02D-PSIRT@ts.fujitsu.com. | ||||||||||||||||||||||||||||
Legal Statement | ||||||||||||||||||||||||||||
Fujitsu does not manufacture the affected microprocessors, that Fujitsu buys from third party suppliers and integrates into its products. Therefore, this communication is based on the information and recommendations Fujitsu has received from the third party suppliers of the affected microprocessors. Fujitsu does not warrant that this communication is applicable or complete for all customers and all situations. Fujitsu recommends that customers determine the applicability of this communication to their individual situation and take appropriate measures. Fujitsu is not liable for any damages or other negative effects, resulting from customers’ use of this communication. All details of this communication are provided "as is" without any warranty or guarantee. Fujitsu reserves the right to change or update this communication at any time. Websites of other companies referred to in this communication are the sole responsibility of such other companies. Fujitsu does not assume any liability with respect to any information and materials provided by its suppliers, including on such websites. Designations may be protected by trademarks and/or copyrights of Fujitsu or the respective owners, the use of which by third parties for their own purposes may infringe the rights of such owners. |