Getac Technology Corporation Statement for 2023H2 security update
NOTICE:
- Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Intel Corporation (“Intel”) / Insyde Software Corp. (“Insyde”) on supported Getac systems. Please refer to the table below to identify fixes for your systems.
- A security vulnerability for various Getac products with UEFI has been identified by third-party researcher, Eclypsium Inc. (“Eclypsium”). The vulnerability may allow an arbitrary code execution during boot while secure boot is on. Getac has released BIOS updates for the affected Getac products and recommends our users to update to the latest version. Getac hereby appreciates Eclypsium for their effort in identifying and bringing the issue to our attention.
Release Date: 29th Dec, 2023
Latest Release Date: Updated: 29th Dec, 2023
Summary:
Intel SA-00924: Potential security vulnerabilities in the BIOS firmware for some Intel® Processors may allow escalation of privilege or denial of service. Intel is releasing BIOS updates to mitigate these potential vulnerabilities. (link)
Intel SA-00828: A potential security vulnerability in some Intel® Processors may allow information disclosure. Intel is releasing firmware updates and an optional software sequence to mitigate this potential vulnerability. (link)
Intel SA-00813: Potential security vulnerabilities in the BIOS firmware for some Intel® Processors may allow escalation of privilege, information disclosure or denial of service. Intel is releasing firmware updates to mitigate these potential vulnerabilities. (link)
Intel SA-00783: Potential security vulnerabilities in the Intel® Converged Security Management Engine (CSME), Active Management Technology (AMT) and Intel® Standard Manageability software may allow escalation of privilege or denial of service. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)
Intel SA-00766: Potential security vulnerabilities in some Intel® PROSet/Wireless WiFi and Killer™ WiFi products may allow escalation of privilege or denial of service. Intel is releasing firmware and software updates to mitigate these potential vulnerabilities. (link)
Insyde SA-2023052: SystemFirmwareManagementRuntimeDxe: potential arbitrary code execution in the DXE phase (link)
Insyde SA-2023045: TrEEConfigDriver: Vulnerable devices can report false TPM PCR values masking malware activity. (link)
Insyde SA-2023050: Secure Boot Security Feature Bypass Vulnerability. (link)
Insyde SA-2023047: SysPasswordDxe: Cleartext storage of system password could lead to possible information disclosure. (link)
Insyde SA-2023039: FvbServicesRuntimeDxe: Exposes an SMI handler that allows an attacker to interact with the SPI flash. (link)
Insyde SA-2023038: FDM TOCTOU access after measurement allows redirected code execution. (link)
Insyde SA-2023036: MeSetup UEFI variable may be overwritten and causes DOS attacks. (link)
Insyde SA-2023034: Insyde Setup EFI Variable Lock Bypass Vulnerability. (link)
Insyde SA-2023026: [EDK2] Empty TPM Platform Auth. (link)
Insyde SA-2023018: The CapsuleIFWUSmm driver does not check the return value which may cause memory leak. (link)
Insyde SA-2023003: DMA attacks on the IHISI command buffer could cause TOCTOU issues which could lead to corruption of SMRAM and escalation of privileges. (link)
Getac Affected Products and Recommendation:
- For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below:
- The latest version solution is backwards-compatible with the previous version.
GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00766)
* Please note that the schedule above is subject to change due to the test status.
GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00783)
* Please note that the schedule above is subject to change due to the test status.
GETAC AFFECTED PRODUCTS AND SOLUTION (Intel SA-00813/ Intel SA-00828/ Intel SA-00924/All Insyde SAs)
* Please note that the schedule above is subject to change due to the test status.
Getac Disclaimer:
All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.