Omitir para ir al contenido principal
  • Hacer pedidos rápida y fácilmente
  • Ver pedidos y realizar seguimiento al estado del envío
  • Cree y acceda a una lista de sus productos
  • Administre sus sitios, productos y contactos de nivel de producto de Dell EMC con Administración de la empresa.

Número del artículo: 000137364


Speculative Execution Side-Channel Vulnerabilities (CVE-2018-3615, CVE-2018-3620, and CVE-2018-3646): Impact on Dell PCs and Thin Client Products

Resumen: Dell is aware of a recently disclosed class of CPU speculative execution vulnerabilities (CVE-2018-3615, CVE-2018-3620, and CVE-2018-3646) known collectively as "L1 Terminal Fault" (L1TF) that affect Intel microprocessors, refer to the information within. ...

Contenido del artículo


Síntomas

CVE ID: CVE-2018-3615, CVE-2018-3620, CVE-2018-3646

Dell is aware of a recently disclosed class of CPU speculative execution vulnerabilities (CVE-2018-3615, CVE-2018-3620, and CVE-2018-3646) known collectively as "L1 Terminal Fault" (L1TF) that affect Intel microprocessors. For more information on these vulnerabilities, please review the security advisory posted by Intel.

Dell is investigating the impact of these vulnerabilities on our products and we are working with Intel and other industry partners to mitigate these vulnerabilities. Mitigation may vary by product and may require updates to Operating System (OS), Virtual Machine Manager (VMM), and other software components. Microcode released as part of CVE-2018-3639 and CVE-2018-3640 mitigation is sufficient.

Dell recommends customers follow security best practices for malware protection to help prevent possible exploitation of these vulnerabilities until any future updates can be applied. These practices include, but are not limited to, promptly deploying software updates, avoiding unknown hyperlinks and websites, never downloading files or applications from unknown sources, and employing up-to-date anti-virus and advanced threat protection solutions.

Dell Client Products Affected

The systems below are affected and will receive updated firmware via Dell BIOS release (BIOS update). Dates in this list are dependent on microcode delivery from CPU Vendors. These dates are estimates provided for customer planning purposes and will be updated with links to download packages when available.

There are two essential components that need to be applied to mitigate the above-mentioned vulnerabilities:

  1. System BIOS as listed in the CVE-2018-3639 and CVE-2018-3640 Product Tables
  2. Operating System & Hypervisor updates

For information on other Dell products, please see https://www.dell.com/support/article/sln318303.

External references

Propiedades del artículo


Fecha de la última publicación

21 feb 2021

Versión

4

Tipo de artículo

Solution