聯絡我們

全球據點

線上諮詢

線上諮詢技術人員

聯絡我們

透過電子郵件詢問問題或提供意見

Language

We have noticed that you are visiting from North American areas. Would you like to browse the US site (US.DFI.com) for a better experience?

告訴我們您的想法

可以請您回答一個簡短的問卷嗎?

網站反饋

*必填欄位

感謝您填寫這份問卷。 您的反饋將有助於改進我們的網站,並提供更好的用戶體驗。

網站反饋

您的反饋建議已成功送出,非常感謝您的參與。

關閉
關於友通 新聞中心 安全警示:Intel® 處理器的MDS資安漏洞
產品新聞

安全警示:Intel® 處理器的MDS資安漏洞

2019/05/31 (UTC+8)

Dear DFI's Valued Customers,

DFI is aware of a new group of security vulnerabilities collectively known as Microarchitectural Data Sampling (MDS).
MDS is a subclass of previously disclosed speculative execution side-channel attacks on Intel® CPUs and consists of the following CVE assignments:

● CVE-2019-11091 - Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
● CVE-2018-12126 - Microarchitectural Store Buffer Data Sampling (MSBDS)
● CVE-2018-12127 - Microarchitectural Load Port Data Sampling (MLPDS)
● CVE-2018-12130- Microarchitectural Fill Buffer Data Sampling (MFBDS)


Systems with microprocessors utilizing speculative execution in microarchitectural structures may be exploited by malicious code for improper data access.
The severity of these vulnerabilities is classified as low to medium by the Common Vulnerability Scoring System (CVSS).
So far there are no known reports of exploits outside of a research environment.
These issues can be mitigated with an update to Intel® microprocessor microcode through OS or BIOS update.
We recommend installing the OS update to ensure protection against MDS vulnerabilities.
BIOS updates will only be available upon request.
DFI will continue to closely work with Intel® to investigate and mitigate any potential impact to affected products and will keep our customers informed of new threats and vulnerabilities.
For more information about these vulnerabilities such as impacted Intel® platforms, please see Microarchitectural Data Sampling Advisory from Intel® Product Security Center.
Regarding developing products, DFI will install the latest OS and BIOS updates prior to their release. 

Sincerely,
DFI Inc.

OS Update

Windows
Please check your Windows version and apply the updates below to help you manage security risks and keep your systems protected.

OS  Version

KB Number

Download

Windows 10 for x64-based Systems

4499154

Security Update

Windows 10 Version 1607 for x64-based Systems

4494440

Security Update

Windows 10 Version 1703 for x64-based Systems

4499181

Security Update

Windows 10 Version 1709 for 64-based Systems

4499179

Security Update

Windows 10 Version 1803 for x64-based Systems

4499167

Security Update

Windows 10 Version 1809 for x64-based Systems

4494441

Security Update

Windows 10 Version 1903 for x64-based Systems

4497936

Security Update

Windows 7 for x64-based Systems Service Pack 1

4499164

Monthly Rollup

4499175

Security Only

Windows 8.1 for x64-based systems

4499151

Monthly Rollup

4499165

Security Only

Windows Server 2008 R2 for x64-based Systems Service Pack 1

4499164

Monthly Rollup

4499175

Security Only

Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)

4499164

Monthly Rollup

4499175

Security Only

Windows Server 2012

4499171

Monthly Rollup

4499158

Security Only

Windows Server 2012 (Server Core installation)

4499171

Monthly Rollup

4499158

Security Only

Windows Server 2012 R2

4499151

Monthly Rollup

4499165

Security Only

Windows Server 2012 R2 (Server Core installation)

4499151

Monthly Rollup

4499165

Security Only

Windows Server 2016

4494440

Security Update

Windows Server 2016 (Server Core installation)

4494440

Security Update

Windows Server 2019

4494441

Security Update

Windows Server 2019 (Server Core installation)

4494441

Security Update

Windows Server, version 1803 (Server Core Installation)

4499167

Security Update

Windows Server, version 1903 (Server Core installation)

4497936

Security Update

 

The above security updates information references Microsoft Security Advisory ADV190013.

 

Linux

Linux system users can protect their systems by updating to the latest kernel and Intel® microcode, please visit respective OS vendors' security announcements and mitigation guidance.

The following are some examples of MDS security announcements from different Linux distributions:

Ubuntu
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/MDS

RedHat
https://access.redhat.com/security/vulnerabilities/mds

SUSE
https://www.suse.com/support/kb/doc/?id=7023736

For more information on Intel’s release of microcode updates (MCU), please see Microcode Updates (MCU) updates.