We have noticed that you are visiting from North American areas. Would you like to browse the US site (US.DFI.com) for a better experience?

可以请您回答一个简短的问卷吗?

感谢您填写这份问卷。您的反馈将有助于改进我们的网站,并提供更好的用户体验。

您的反馈建议已成功送出,非常感谢您的参与。

关闭
关于友通 新闻中心 Security Alert: Microarchitectural Data Sampling (MDS) in Intel® CPUs
产品新闻

Security Alert: Microarchitectural Data Sampling (MDS) in Intel® CPUs|新闻中心|DFI

Security Alert: Microarchitectural Data Sampling (MDS) in Intel® CPUs

2019/05/31 (UTC+8)

Dear DFI's Valued Customers,

DFI is aware of a new group of security vulnerabilities collectively known as Microarchitectural Data Sampling (MDS).
MDS is a subclass of previously disclosed speculative execution side-channel attacks on Intel® CPUs and consists of the following CVE assignments:

● CVE-2019-11091 - Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
● CVE-2018-12126 - Microarchitectural Store Buffer Data Sampling (MSBDS)
● CVE-2018-12127 - Microarchitectural Load Port Data Sampling (MLPDS)
● CVE-2018-12130- Microarchitectural Fill Buffer Data Sampling (MFBDS)


Systems with microprocessors utilizing speculative execution in microarchitectural structures may be exploited by malicious code for improper data access.
The severity of these vulnerabilities is classified as low to medium by the Common Vulnerability Scoring System (CVSS).
So far there are no known reports of exploits outside of a research environment.
These issues can be mitigated with an update to Intel® microprocessor microcode through OS or BIOS update.
We recommend installing the OS update to ensure protection against MDS vulnerabilities.
BIOS updates will only be available upon request.
DFI will continue to closely work with Intel® to investigate and mitigate any potential impact to affected products and will keep our customers informed of new threats and vulnerabilities.
For more information about these vulnerabilities such as impacted Intel® platforms, please see Microarchitectural Data Sampling Advisory from Intel® Product Security Center.
Regarding developing products, DFI will install the latest OS and BIOS updates prior to their release. 

Sincerely,
DFI Inc.

OS Update

Windows
Please check your Windows version and apply the updates below to help you manage security risks and keep your systems protected.

OS  Version

KB Number

Download

Windows 10 for x64-based Systems

4499154

Security Update

Windows 10 Version 1607 for x64-based Systems

4494440

Security Update

Windows 10 Version 1703 for x64-based Systems

4499181

Security Update

Windows 10 Version 1709 for 64-based Systems

4499179

Security Update

Windows 10 Version 1803 for x64-based Systems

4499167

Security Update

Windows 10 Version 1809 for x64-based Systems

4494441

Security Update

Windows 10 Version 1903 for x64-based Systems

4497936

Security Update

Windows 7 for x64-based Systems Service Pack 1

4499164

Monthly Rollup

4499175

Security Only

Windows 8.1 for x64-based systems

4499151

Monthly Rollup

4499165

Security Only

Windows Server 2008 R2 for x64-based Systems Service Pack 1

4499164

Monthly Rollup

4499175

Security Only

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

4499164

Monthly Rollup

4499175

Security Only

Windows Server 2012

4499171

Monthly Rollup

4499158

Security Only

Windows Server 2012 (Server Core installation)

4499171

Monthly Rollup

4499158

Security Only

Windows Server 2012 R2

4499151

Monthly Rollup

4499165

Security Only

Windows Server 2012 R2 (Server Core installation)

4499151

Monthly Rollup

4499165

Security Only

Windows Server 2016

4494440

Security Update

Windows Server 2016 (Server Core installation)

4494440

Security Update

Windows Server 2019

4494441

Security Update

Windows Server 2019 (Server Core installation)

4494441

Security Update

Windows Server, version 1803 (Server Core Installation)

4499167

Security Update

Windows Server, version 1903 (Server Core installation)

4497936

Security Update

 

The above security updates information references Microsoft Security Advisory ADV190013.

 

Linux

Linux system users can protect their systems by updating to the latest kernel and Intel® microcode, please visit respective OS vendors' security announcements and mitigation guidance.

The following are some examples of MDS security announcements from different Linux distributions:

Ubuntu
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/MDS

RedHat
https://access.redhat.com/security/vulnerabilities/mds

SUSE
https://www.suse.com/support/kb/doc/?id=7023736

For more information on Intel’s release of microcode updates (MCU), please see Microcode Updates (MCU) updates.