CVE ID: CVE-2017-5715, CVE-2017-5753, CVE-2017-5754
Dell Technologies is aware of the side-channel analysis vulnerabilities (also known as Meltdown and Spectre) affecting many modern microprocessors that were publicly described by a team of security researchers on January 3, 2018. We encourage customers to review the Security Advisories in the References section for more information.
There are two essential components that must be applied to mitigate the above-mentioned vulnerabilities:
Dell Storage Product Line
|
Assessment
|
EqualLogic PS Series | The CPU used in this product does not implement speculative execution, therefore the vulnerabilities do not apply to this hardware. |
Dell EMC SC Series (Dell Compellent) | Access to the platform operating system to load external code is restricted; malicious code cannot be run. |
Dell Storage MD3 and DSMS MD3 Series | Access to the platform operating system to load external code is restricted; malicious code cannot be run. |
Dell PowerVault Tape Drives and Libraries | Access to the platform operating system to load external code is restricted; malicious code cannot be run. |
Dell Storage FluidFS Series (includes: FS8600, FS7600, FS7610, FS7500, NX3600, NX3610, NX3500) | Access to the platform operating system to load external code is restricted to privileged accounts only. Malicious code cannot be run, provided the recommended best practices to protect the access of privileged accounts are followed. |
Dell Storage Virtual Appliance
|
Assessment
|
Dell Storage Manager Virtual Appliance (DSM VA - Dell Compellent) | These virtual appliances do not provide general user access. They are single-user, root-user-only, and therefore do not introduce any additional security risk to an environment. The host system and hypervisor must be protected; see vendor links and best practices statement, above. |
Dell Storage Integration tools for VMware (Dell Compellent) | |
Dell EqualLogic Virtual Storage Manager (VSM - EqualLogic) |
Component
|
Assessment
|
iDRAC: 14G, 13G, 12G, 11G
|
Not impacted.
iDRAC is a closed system that does not allow external third-party code to be performed. |
Chassis Management Controller (CMC): 14G, 13G, 12G, 11G
|
Not impacted.
CMC is a closed system that does not allow external third-party code to be performed. |
Platforms | Assessment |
Dell 10Gb Ethernet Pass-Through |
These products are a single-user, root-user-only appliance. The reported issues do not introduce any additional security risk to a customer's environment, provided the recommended best practices to protect the access of highly privileged accounts are followed.
|
Dell 10Gb-K Ethernet Pass-Through | |
Dell Ethernet Pass-Through | |
FC8 Pass-Through | |
Force10 MXL Blade | |
PowerConnect M6220 | |
PowerConnect M6348 | |
PowerConnect M8024 | |
PowerConnect M8024-K |
Platforms | Assessment |
Brocade M5424, M6505, M8428-k | Vendor Statement |
Cisco Catalyst 3032, 3130, 3130G, 3130X | Vendor Statement |
Cisco Catalyst Nexus B22 Dell Blade Fabric Extender | Vendor Statement |
Platforms | Assessment |
C1048P, C9010 |
These products are a single-user, root-user-only appliance. The reported issues do not introduce any additional security risk to a customer's environment, provided the recommended best practices to protect the access of highly privileged accounts are followed. |
M I/O Aggregator | |
MXL | |
FX2 | |
N11xx, N15xx, N20xx, N30xx, | |
N2128PX, N3128PX | |
S55, S60 | |
S3048-On OS9, S3048-on OS10 Enterprise, S3100, S3124F, S3124P, S3148P | |
S4048, S4048-ON OS9, S4048-ON OS10 Enterprise, S4048T-ON OS9, S4048T-ON OS10 Enterprise | |
S4128F-ON, S4148F-ON, S4128T-ON, S4148T-ON, S4148U-ON, S4148FE-ON, S4148FB, S4248FBL | |
S5048, S5048F-ON, S5148F | |
S6000, S6000-ON OS9, S6010-ON OS9, S6010-ON OS10 Enterprise, S6100-ON | |
SIOM | |
Z9000, Z9100 OS9, Z9100 OS10 Enterprise |
Platforms | Assessment |
PowerConnect 2016, 2124, 2216, 2224, 2324, 2508, 2608 2616, 2624 |
These products are a single-user, root-user-only appliance. The reported issues do not introduce any additional security risk to a customer's environment, provided the recommended best practices to protect the access of highly privileged accounts are followed. |
PowerConnect 2708, 2716, 2724, 2748, 2808, 2816, 2824, 2848 | |
PowerConnect 3024, 3048, 3248, 3324, 3348 | |
PowerConnect 3424, 3424P, 3448, 3448P, 3524, 3524P, 3548, 3548P | |
PowerConnect 5012, 5212, 5224, 5316M, 5324, 5424, 5448, 5524, 5524P, 5548, 5548P | |
PowerConnect 6024, 6024F, 6224, 6224F, 6224P, 6248, 6248P | |
PowerConnect 7024, 7024F, 7024P, 7048, 7048P, 7048R | |
PowerConnect 8024, 8024F, 8100 Series | |
PowerConnect B-8000, B-8000e, B-FCXs, B-T124X | |
PowerConnect J-EX4200, J-EX4200-24F, J-EX4200-24t, J-EX4200-48t, J-EX4500 | |
PowerConnect J-SRX100, J-SRX210, SRX240 | |
C9000 Series Line Cards |
Platforms | Assessment |
Brocade 300, 4424 Switch Fi, 5100, 5300 | Vendor Statement |
Brocade 6505, 6510, 6520, G620 | Vendor Statement |
Cisco Catalyst 3750E-48TD, 4900M, 4948-10GE | Vendor Statement |
Platforms | Assessment |
Active Fabric Controller | Software Unaffected |
Active Fabric Manager | Software Unaffected |
Dell Networking vCenter Plug-in | Software Unaffected |
Dell OpenManage Network Manager | Software Unaffected |
Open Automation | Software Unaffected |
Software Defined Networking | Software Unaffected |
Generation | Models | BIOS version |
13G | R830 | 1.7.1 |
T130, R230, T330, R330, NX430 | 2.4.3 | |
R930 | 2.5.1 | |
R730, R730XD, R630, NX3330, NX3230, DSMS630, DSMS730, XC730, XC703XD, XC630 | 2.7.1 | |
C4130 | 2.7.1 | |
M630, M630P, FC630 | 2.7.1 | |
FC430 | 2.7.1 | |
M830, M830P, FC830 | 2.7.1 | |
T630 | 2.7.1 | |
R530, R430, T430, XC430, XC430Xpress | 2.7.1 | |
R530XD | 1.7.0 | |
C6320, XC6320 | 2.7.1 | |
C6320P | 2.0.5 | |
T30 | 1.0.12 |
Generation | Models | BIOS version |
12G | R920 | 1.7.1 |
R820 | 2.4.1 | |
R520 | 2.5.1 | |
R420 | 2.5.1 | |
R320, NX400 | 2.5.1 | |
T420 | 2.5.1 | |
T320 | 2.5.1 | |
R220 | 1.10.2 | |
R720, R720XD, NX3200, XC720XD | 2.6.1 | |
R620, NX3300 | 2.6.1 | |
M820 | 2.6.1 | |
M620 | 2.6.1 | |
M520 | 2.6.1 | |
M420 | 2.6.1 | |
T620 | 2.6.1 | |
FM120x4 | 1.7.0 | |
T20 | A16 | |
C5230 | 1.3.1 | |
C6220 | 2.5.5 | |
C6220II | 2.8.1 | |
C8220, C8220X | 2.8.1 |
Generation | Models | BIOS version |
11G | R710 | 6.5.0 |
NX3000 | 6.6.0*** | |
R610 | 6.5.0 | |
T610 | 6.5.0 | |
R510 | 1.13.0 | |
NX3100 | 1.14.0*** | |
R410 | 1.13.0 | |
NX300 | 1.14.0*** | |
T410 | 1.13.0 | |
R310 | 1.13.0 | |
T310 | 1.13.0 | |
NX200 | 1.14.0*** | |
T110 | 1.11.1 | |
T110-II | 2.9.0 | |
R210 | 1.11.0 | |
R210-II | 2.9.0 | |
R810 | 2.10.0 | |
R910 | 2.11.0 | |
T710 | 6.5.0 | |
M610, M610X | 6.5.0 | |
M710 | 6.5.0 | |
M710HD | 8.3.1 | |
M910 | 2.11.0 | |
C1100 | 3B24 | |
C2100 | 3B24 | |
C5220 | 2.2.0 | |
C6100 | 1.80 | |
R415 | 2.4.1 | |
R515 | 2.4.1 | |
R715 | 3.4.1 | |
R815 | 3.4.1 | |
M915 | 3.3.1 | |
C6105 | 2.6.0 | |
C6145 | 3.6.0 |
Models | BIOS/Firmware/Driver version |
OS10 Basic VM | In the process |
OS10 Enterprise VM | In the process |
S OS-Emulator | In the process |
Z OS-Emulator | In the process |
S3048-ON OS10 Basic | In the process |
S4048-ON OS10 Basic | In the process |
S4048T-ON OS10 Basic | In the process |
S6000-ON OS Basic | In the process |
S6010-ON OS10 Basic | In the process |
Z9100 OS10 Basic | In the process |
Platforms | BIOS/FIrmware/Driver version |
Mellanox SB7800 Series, SX6000 Series | Mellanox is carefully investigating the released patches, and will release software updates when available. Vendor Statement |
Models | BIOS/Firmware/Driver version |
W-3200, W-3400, W-3600, W-6000, W-620, W-650, W-651 | Link - requires login. |
W-7005, W-7008, W-7010, W-7024, W-7030, W-7200 Series, W-7205 | Link - requires login. |
W-AP103, W-AP103H, W-AP105, W-AP114, W-AP115, W-AP124, W-AP125, W-AP134, W-AP135, W-AP175 | Link - requires login. |
W-AP204, W-AP205, W-AP214, W-AP215, W-AP224, W-AP225, W-AP274, W-AP275 | Link - requires login. |
W-AP68, W-AP92, W-AP93, W-AP93H | Link - requires login. |
W-IAP103, W-IAP104, W-IAP105, W-IAP108, W-IAP109, W-IAP114, W-IAP115, W-IAP134, W-IAP135 | Link - requires login. |
W-IAP155, W-IAP155P, W-IAP175P, W-IAP175AC, W-IAP204, W-IAP205, W-IAP214, W-IAP215 | Link - requires login. |
W-IAP-224, W-IAP225, W-IAP274, W-IAP275, W-IAP3WN, W-IAP3P, W-IAP92, W-IAP93 | Link - requires login. |
W-Series Access Points - 205H, 207, 228, 277, 304, 305, 314, 315, 324, 325, 334, 335 | Link - requires login. |
W-Series Controller AOS | Link - requires login. |
W-Series FIPS | Link - requires login. |
Models | BIOS/Firmware/Driver version |
W-Airwave | Link - requires login - Ensure that Hypervisor has appropriate patches. |
W-ClearPass Hardware Appliances | Link - requires login. |
W-ClearPass Virtual Appliances | Link - requires login - Ensure that Hypervisor has appropriate patches. |
W-ClearPass 100 Software | Link - requires login. |
Variant to Patch |
Microcode Update Needed? |
Operating system Patch Needed? |
Spectre (Variant 1) |
No |
Yes |
Spectre (Variant 2) |
Yes |
Yes |
Meltdown (Variant 3) |
No |
Yes |
No Cause Information is Available.
No Resolution Information is Available.