跳至主要內容
  • 簡單快速地下訂單
  • 檢視訂單及追蹤商品運送狀態
  • 建立並存取您的產品清單
部分文章編號可能已變更。如果這不是您要找的文章,請嘗試搜尋所有文章。搜尋文章

Meltdown/Spectre (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754) impact on Dell Products

摘要: Dell is aware of the side-channel analysis vulnerabilities described in CVEs 2017-5715, 2017-5753 and 2017-5754, known as Meltdown and Spectre affecting many modern microprocessors. Refer to the resourses and links for more information. ...

本文章適用於 本文章不適用於 本文無關於任何特定產品。 本文未識別所有產品版本。

症狀

Dell is aware of the side-channel analysis vulnerabilities described in CVEs 2017-5715, 2017-5753 and 2017-5754, known as Meltdown and Spectre affecting many modern microprocessors. For more information, please visit security updates posted by Intel and AMD.

Here is an overview of the issue:
  • The issue is not specific to any one vendor and takes advantage of techniques commonly used in most of the modern processor architectures. This means that a large range of products are affected from desktops and laptops to servers and storage, even smartphones.
  • Mitigations include updates to both system software (Operating System (OS) patch) and firmware (BIOS, microcode updates). In some environments this may include hypervisor patches, patches to virtualization software, browsers and JavaScript engines.
  • Good security hygiene should continue to be used. This includes ensuring devices are updated with the latest patches, employing anti-virus updates and advanced threat protection solutions.  
  • As Intel reported in their FAQ, researchers demonstrated a proof of concept. That said, Dell is not aware of any exploits to date.
SLN318301_en_US__1icon Note: You can change the language on many of the web page(s).

Patch Guidance (updated March 20, 2018)

There are two essential components that need to be applied to mitigate the above mentioned vulnerabilities:
1) Apply the firmware update via BIOS update.
2) Apply the applicable operating system (OS) patch.

What does this mean for you?

For more information on affected platforms and next steps to apply the updates, please refer to the following resources. They will be updated regularly as new information becomes available. Dell is testing all firmware updates before deploying them to ensure minimal impact to customers.

Dell PCs and Thin Client
Dell EMC Server, Dell Storage and Networking products
Dell EMC Storage, Data Protection and Converged Platforms (log in required to access the content)
RSA products (log in required to access the content)
Dell EMC Converged Platforms (vBlock) (log in required to access the content)
VMware products
Pivotal products

 

Dell is deploying the OS patches and firmware updates within our own IT infrastructure in line with best security practices.

Additional resources:

文章屬性
文章編號: 000177783
文章類型: Solution
上次修改時間: 21 2月 2021
版本:  5
向其他 Dell 使用者尋求您問題的答案
支援服務
檢查您的裝置是否在支援服務的涵蓋範圍內。