Getac Technology Corporation Statement on Intel security update (2021.2 IPU)
NOTICE: Getac Technology Corporation (“Getac”) continues to work on qualifying and applying the fixes provided by Intel on supported Getac systems. Please refer to the table below to identify fixes for your systems.
Release Date: 1st Mar, 2022
Last Updated: 1st Mar, 2022
Summary:
SA-00470: Potential security vulnerabilities in some Intel® Chipset Firmware in Intel® Server Platform Services (SPS), Intel® Active Management Technology (AMT) and the Intel Power Management Controller (PMC) may allow escalation of privilege or denial of service. Intel is releasing firmware updates to mitigate these potential vulnerabilities. (link)
CVEID: CVE-2021-0060 / CVEID: CVE-2021-33068 / CVEID: CVE-2021-0147
SA-00509: Potential security vulnerabilities in some Intel® PROSet/Wireless WiFi and Killer™ WiFi may allow escalation of privilege, denial of service or information disclosure. Intel is releasing firmware and software updates to mitigate these potential vulnerabilities. (link)
CVEID: CVE-2021-0063 / CVEID: CVE-2021-0078 / CVEID: CVE-2021-0071 / CVEID: CVE-2021-0082 / CVEID: CVE-2021-0064 / CVEID: CVE-2021-0065 / CVEID: CVE-2021-0069 / CVEID: CVE-2021-0075 / CVEID: CVE-2021-0079 / CVEID: CVE-2021-0053
SA-00527: Potential security vulnerabilities in the BIOS firmware for some Intel® processors may allow escalation of privilege, denial of service or information disclosure. Intel is releasing firmware updates to mitigate these potential vulnerabilities. (link)
CVEID: CVE-2021-0103 / CVEID: CVE-2021-0114 / CVEID: CVE-2021-0115 / CVEID: CVE-2021-0116 / CVEID: CVE-2021-0117 / CVEID: CVE-2021-0118 / CVEID: CVE-2021-0099 / CVEID: CVE-2021-0156 / CVEID: CVE-2021-0111 / CVEID: CVE-2021-0107 / CVEID: CVE-2021-0125 / CVEID: CVE-2021-0124 / CVEID: CVE-2021-0119 / CVEID: CVE-2021-0092 / CVEID: CVE-2021-0091 / CVEID: CVE-2021-0093
SA-00532: A potential security vulnerability in some Intel® processors that may allow a denial of service. Intel® is releasing firmware updates to mitigate this potential vulnerability. (link)
CVEID: CVE-2021-0127
SA-00533: A potential security vulnerability in some Intel® Thunderbolt™ Declarative Componentized Hardware (DCH) Drivers for Windows may allow denial of service. Intel is releasing software updates to mitigate this potential vulnerability. (link)
CVEID: CVE-2021-0110
SA-00539: Potential security vulnerabilities in some Intel® PROSet/Wireless Wi-Fi, Intel® Active Management Technology (Intel® AMT) Wireless and Killer™ Wi-Fi may allow escalation of privilege, denial of service or information disclosure. Intel is releasing firmware and software updates to mitigate these potential vulnerabilities. (link)
CVEID: CVE-2021-0162 / CVEID: CVE-2021-0163 / CVEID: CVE-2021-0161 / CVEID: CVE-2021-0164 / CVEID: CVE-2021-0165 / CVEID: CVE-2021-0066 / CVEID: CVE-2021-0166 / CVEID: CVE-2021-0167 / CVEID: CVE-2021-0169 / CVEID: CVE-2021-0168 / CVEID: CVE-2021-0170 / CVEID: CVE-2021-0171 / CVEID: CVE-2021-0172 / CVEID: CVE-2021-0173 / CVEID: CVE-2021-0174 / CVEID: CVE-2021-0175 / CVEID: CVE-2021-0076 / CVEID: CVE-2021-0176 / CVEID: CVE-2021-0177 / CVEID: CVE-2021-0178 / CVEID: CVE-2021-0179 / CVEID: CVE-2021-0183 / CVEID: CVE-2021-0072
SA-00540: Potential security vulnerabilities in the installer for some Intel® Wireless Bluetooth® and Killer™ Bluetooth® products may allow escalation of privilege or denial of service. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)
CVEID: CVE-2021-0151 / CVEID: CVE-2021-0152
SA-00561: A potential security vulnerability in some Intel® Processors may allow information disclosure. Intel is releasing firmware updates to mitigate this potential vulnerability. (link)
CVEID: CVE-2021-0145
SA-00562: Potential security vulnerabilities in the BIOS reference code for some Intel® processors may allow escalation of privilege. Intel is releasing firmware updates to mitigate these potential vulnerabilities. (link)
CVEID: CVE-2021-0157 / CVEID: CVE-2021-0158
SA-00566: Potential security vulnerabilities in some Intel® graphics drivers may allow escalation of privilege or denial of service. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)
CVEID: CVE-2021-0121
SA-00581: A potential security vulnerability in some Intel® Wireless Bluetooth® products and Killer™ Bluetooth® products may allow denial of service. Intel is releasing software updates to mitigate these potential vulnerabilities. (link)
CVEID: CVE-2021-33110
SA-00582: Potential security vulnerabilities in some Intel® PROSet/Wireless WiFi and Killer™ WiFi products may allow escalation of privilege, denial of service or information disclosure. Intel is releasing firmware and software updates to mitigate these potential vulnerabilities. (link)
CVEID: CVE-2021-33113 / CVEID: CVE-2021-33115 / CVEID: CVE-2021-33114
SA-00604: Potential security vulnerabilities in some Intel® Wireless Bluetooth® and Killer™ Bluetooth® products may allow denial of service. Intel is releasing firmware updates to mitigate these potential vulnerabilities. (link)
CVEID: CVE-2021-33139 / CVEID: CVE-2021-33155
Getac Affected Products and Recommendation:
- For certain products currently being manufactured or already in the field, Getac will also release solutions for the update. Please check the affected products in the table below:
- The latest version solution is backwards-compatible with the previous version.
GETAC AFFECTED PRODUCTS AND SOLUTION (SA-00470 / SA-00539)
* Please note that the schedule above is subject to change due to the test status.
GETAC AFFECTED PRODUCTS AND SOLUTION (SA-00527 )
Product Name | CPU Generation | SINIT DriverVersion | DriverRelease Date | Latest DriverPlease click on the links below to download |
---|---|---|---|---|
S410 | 11th Gen Core | 1.14.25 | 4/8/2022 | https://support.getac.com/Portal/Page/763 |
K120 | 11th Gen Core | 1.14.25 | 4/8/2022 | https://support.getac.com/Portal/Page/763 |
F110 | 11th Gen Core | 1.14.25 | 4/8/2022 | https://support.getac.com/Portal/Page/763 |
* Please note that the schedule above is subject to change due to the test status.
GETAC AFFECTED PRODUCTS AND SOLUTION (SA-00509 / SA-00539 / SA-00540 / SA-00581 / SA-00582 / SA-00604)
* Please note that the schedule above is subject to change due to the test status.
GETAC AFFECTED PRODUCTS AND SOLUTION (SA-00532 / SA-00561 / SA-00562)
Product Name | CPU Generation | BIOSVersion | BIOSRelease Date | Latest BIOSPlease click on the links below to download |
---|---|---|---|---|
X500 | 7th Gen Core | R1.20.070521 | 2022/3/4 | https://support.getac.com/Portal/Page/763 |
S410 | 6th Gen Core | R1.28.070520 | 2022/3/23 | https://support.getac.com/Portal/Page/763 |
7th & 8th Gen Core | R1.26.070520 | 2022/3/23 | https://support.getac.com/Portal/Page/763 | |
8th Gen Core
(Whiskey Lake) | R1.22.070520 | 2022/3/23 | https://support.getac.com/Portal/Page/763 | |
11th Gen Core | R1.22.070520 | 2022/2/25 | https://support.getac.com/Portal/Page/763 | |
A140 | 6th Gen Core | R1.20.070520 | 2022/3/23 | https://support.getac.com/Portal/Page/763 |
10th Gen Core | R1.10.070520 | 2022/3/4 | https://support.getac.com/Portal/Page/763 | |
B300 | 6th Gen Core | R1.22.070520 | 2022/3/23 | https://support.getac.com/Portal/Page/763 |
8th Gen Core | R1.15.070520 | 2022/3/23 | https://support.getac.com/Portal/Page/763 | |
B360 | 10th Gen Core | R1.24.070520 | 2022/3/4 | https://support.getac.com/Portal/Page/763 |
K120 | 8th Gen Core | R1.15.070520 | 2022/3/23 | https://support.getac.com/Portal/Page/763 |
11th Gen Core | R1.12.070520 | 2022/2/25 | https://support.getac.com/Portal/Page/763 | |
V110 | 6th Gen Core | R1.25.070520 | 2022/3/23 | https://support.getac.com/Portal/Page/763 |
7th Gen Core | R1.18.070520 | 2022/3/23 | https://support.getac.com/Portal/Page/763 | |
8th Gen Core
(Whiskey Lake) | R1.12.070520 | 2022/3/23 | https://support.getac.com/Portal/Page/763 | |
10th Gen Core | R1.09.070520 | 2022/3/4 | https://support.getac.com/Portal/Page/763 | |
F110 | 6th Gen Core | R1.16.070522 | 2022/3/23 | https://support.getac.com/Portal/Page/763 |
7th Gen Core | R1.16.070521 | 2022/3/23 | https://support.getac.com/Portal/Page/763 | |
8th Gen Core
(Whiskey Lake) | R1.16.070520 | 2022/3/4 | https://support.getac.com/Portal/Page/763 | |
11th Gen Core | R1.07.070520 | 2022/2/25 | https://support.getac.com/Portal/Page/763 | |
UX10 |
8th Gen Core
(Whiskey Lake) | R1.17.070520 | 2022/3/23 | https://support.getac.com/Portal/Page/763 |
10th Gen Core | R1.14.070520 | 2022/3/4 | https://support.getac.com/Portal/Page/763 |
* Please note that the schedule above is subject to change due to the test status.
GETAC AFFECTED PRODUCTS AND SOLUTION (SA-00533)
Product Name | CPU Generation | Thunderbolt™ DCH DriverVersion | DriverRelease Date | Latest DriverPlease click on the links below to download |
---|---|---|---|---|
S410 | 11th Gen Core | 1.41.1094.0 | 4/8/2022 | https://support.getac.com/Portal/Page/763 |
K120 | 11th Gen Core | 1.41.1054.0 | 4/8/2022 | https://support.getac.com/Portal/Page/763 |
* Please note that the schedule above is subject to change due to the test status.
GETAC AFFECTED PRODUCTS AND SOLUTION (SA-00566)
Product Name | CPU Generation | Graphics DriverVersion | DriverRelease Date | Latest DriverPlease download from link below |
---|---|---|---|---|
X500 | 7th Gen Core | 30.0.100.9930 | 4/8/2022 | https://support.getac.com/Portal/Page/763 |
S410 | 6th Gen Core | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 |
7th & 8th Gen Core | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 | |
8th Gen Core (Whiskey Lake) | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 | |
11th Gen Core | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 | |
A140 | 6th Gen Core | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 |
10th Gen Core | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 | |
B300 | 6th Gen Core | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 |
8th Gen Core | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 | |
B360 | 10th Gen Core | 27.20.100.9316 | 4/8/2022 | https://support.getac.com/Portal/Page/763 |
K120 | 8th Gen Core | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 |
11th Gen Core | 30.0.100.9836 | 4/8/2022 | https://support.getac.com/Portal/Page/763 | |
V110 | 6th Gen Core | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 |
7th Gen Core | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 | |
8th Gen Core (Whiskey Lake) | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 | |
10th Gen Core | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 | |
F110 | 6th Gen Core | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 |
7th Gen Core | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 | |
8th Gen Core (Whiskey Lake) | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 | |
UX10 | 8th Gen Core (Whiskey Lake) | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 |
10th Gen Core | 30.0.100.9929 | 4/8/2022 | https://support.getac.com/Portal/Page/763 |
* Please note that the schedule above is subject to change due to the test status.
Getac Disclaimer:
All content and other information mentioned in this statement or offered arising from the issue described herein are provided on an “as is ” basis. Getac hereby expressly disclaims any warranties of any kind, express or implied, including without limitation warranties of merchantability, fitness for any particular purpose, non-infringement of intellectual property. All products, information, and figures specified are preliminary based on current expectations and Getac reserves the right to change or update any content thereof at any time without prior notice. Getac assessments have been estimated or simulated using Getac internal analysis or architecture simulation or modeling, and may not represent the actual risk to the users’ local installation and individual environment. Users are recommended to determine the applicability of this statement to their specified environments and take appropriate actions. The use of this statement, and all consequences of such use, is solely at the user’s own responsibility, risk, and expense thereof. In no event shall Getac or any of its affiliates be liable for any and all claims, damages, costs or expenses, including without limitation, loss of profits, loss of data, loss of business expectancy, compensatory, direct, indirect, consequential, punitive, special, or incidental damages or business interruption arising out of or in connection with related to the information contained herein or actions that the user decides to take based thereon. Getac reserves the right to interpret this disclaimer and update this disclaimer whenever necessary.