Passer au contenu principal
  • Passer des commandes rapidement et facilement
  • Voir les commandes et de suivre l'état de votre expédition
  • Profitez membres seulement récompenses et des remises
  • Créez et accédez à une liste de vos produits
  • Gérez vos sites Dell EMC, vos produits et vos personnes-ressources pour les produits dans Administration de l’entreprise.

Meltdown/Spectre (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754) impact on Dell Products

Sommaire: Dell is aware of the side-channel analysis vulnerabilities described in CVEs 2017-5715, 2017-5753 and 2017-5754, known as Meltdown and Spectre affecting many modern microprocessors. Refer to the resourses and links for more information. ...

Cet article peut avoir été traduit automatiquement. Si vous avez des commentaires sur sa qualité, veuillez nous en faire part en utilisant le formulaire au bas de cette page.

Contenu de l’article


Symptômes

Dell is aware of the side-channel analysis vulnerabilities described in CVEs 2017-5715, 2017-5753 and 2017-5754, known as Meltdown and Spectre affecting many modern microprocessors. For more information, please visit security updates posted by Intel and AMD.

Here is an overview of the issue:
  • The issue is not specific to any one vendor and takes advantage of techniques commonly used in most of the modern processor architectures. This means that a large range of products are affected from desktops and laptops to servers and storage, even smartphones.
  • Mitigations include updates to both system software (Operating System (OS) patch) and firmware (BIOS, microcode updates). In some environments this may include hypervisor patches, patches to virtualization software, browsers and JavaScript engines.
  • Good security hygiene should continue to be used. This includes ensuring devices are updated with the latest patches, employing anti-virus updates and advanced threat protection solutions.  
  • As Intel reported in their FAQ, researchers demonstrated a proof of concept. That said, Dell is not aware of any exploits to date.
SLN318301_en_US__1icon Note: You can change the language on many of the web page(s).

Patch Guidance (updated March 20, 2018)

There are two essential components that need to be applied to mitigate the above mentioned vulnerabilities:
1) Apply the firmware update via BIOS update.
2) Apply the applicable operating system (OS) patch.

What does this mean for you?

For more information on affected platforms and next steps to apply the updates, please refer to the following resources. They will be updated regularly as new information becomes available. Dell is testing all firmware updates before deploying them to ensure minimal impact to customers.

Dell PCs and Thin Client
Dell EMC Server, Dell Storage and Networking products
Dell EMC Storage, Data Protection and Converged Platforms (log in required to access the content)
RSA products (log in required to access the content)
Dell EMC Converged Platforms (vBlock) (log in required to access the content)
VMware products
Pivotal products

 

Dell is deploying the OS patches and firmware updates within our own IT infrastructure in line with best security practices.

Additional resources:

Propriétés de l’article


Dernière date de publication

21 févr. 2021

Version

5

Type d’article

Solution