Knowledge Base

Microprocessor Side-Channel Vulnerabilities (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754): Impact on Dell products


CVE ID: CVE-2017-5715, CVE-2017-5753, CVE-2017-5754

Dell is aware of the side-channel analysis vulnerabilities, known as Meltdown and Spectre, affecting many modern microprocessors that were publicly described by a team of security researchers on January 3, 2018. No "real-world" exploits of these vulnerabilities have been reported to date, though researchers have produced proof-of-concepts.

Patch Guidance:
Update 02/07/2018

Per Intel’s guidance on January 22nd, Dell removed all BIOS updates from our support pages while Intel conducted root cause analysis for reported reboot issues and unpredictable system behavior.

Starting February 8th, Dell has made available the previously-removed BIOS updates for Skylake and Atom-based client platforms. Intel has determined that these were unaffected by the reported stability issues and has re-released them without modification. For more information about the Intel microcode revision guidance: https://newsroom.intel.com/wp-content/uploads/sites/11/2018/02/microcode-update-guidance.pdf

Additional BIOS updates for the listed affected platforms based on other processor generations will roll out over the coming weeks.

All customers with an affected platform should download the latest BIOS update listed below. Those who have disabled the microcode patch using an OS configuration option should re-enable it manually after applying the BIOS updates.

There are two essential components that need to be applied to mitigate the above-mentioned vulnerabilities:

  1. Apply the processor microcode update via BIOS update listed in the Dell Products Affected section below.
  2. Apply the applicable operating system patch. See the OS Patch Guidance section below.

Dell will update this article with information as it becomes available, including impacted products and remediation steps.

Dell recommends customers follow security best practices for malware protection, in general, to protect against possible exploitation of these vulnerabilities. These practices include promptly adopting software updates, avoiding unrecognized hyperlinks and websites, not downloading files or applications from unknown sources and following secure password protocols. Customers should also use security software to help protect against malware (advanced threat prevention software or anti-virus).

Note:

Dell Consumer and Commercial Client Products Affected

The systems below are affected and will receive patched firmware via Dell BIOS release (BIOS update). Dates in this list are estimates provided for customer planning purposes and will be updated with links to download packages when available.

Note:
  • Prior to installing the BIOS releases, please ensure Windows Updates are up to date.
  • The dates listed are estimated availability dates, and are subject to change without notice.
  • Dates below are in US format of MM/DD/YY
  • These patches may also include the firmware component of the Intel ME/TXE Advisory (INTEL-SA-00086), please refer to the Dell Knowledge Base on the Intel ME/TXE advisory for complete details.
Client Products
Model Number BIOS Release
Alienware 13 R2 1.4.4
Alienware 13 R3 In Process
Alienware 15 R2 1.4.4
Alienware 15 R3 In Process
Alienware 17 R2 In Process
Alienware 17 R3 1.4.4
Alienware 17 R4 In Process
Alienware Area-51 R2 In Process
Alienware Area-51 R4 In Process
Alienware Area-51 R5 In Process
Alienware Aurora R5 1.0.16
Alienware Aurora R6 In Process
Alienware Aurora R7 In Process
Alienware Steam Machine 200 2.0.10
Alienware Steam Machine 201 1.0.11
Alienware X51 R3 1.2.11
ChengMing 3967 1.2.2
ChengMing 3977 In Process
Edge Gateway 3000 series In Process
Edge Gateway 5000 (Commercial) In Process
Edge Gateway 5100 (Industrial) In Process
Embedded Box PC 3000 In Process
Embedded Box PC 5000 1.4.2
Inspiron 11 (3137) In Process
Inspiron 11 (3162) In Process
Inspiron 11 (3164) In Process
Inspiron 11 (3168) In Process
Inspiron 11 (3169) 1.4.0
Inspiron 11 (3179) In Process
Inspiron 11 2-in-1 (3153) 1.18.2
Inspiron 11 2-in-1 (3158) 1.18.2
Inspiron 13 2-in-1 (5368) 1.15.2
Inspiron 13 2-in-1 (5378) In Process
Inspiron 13 2-in-1 (5379) In Process
Inspiron 13 2-in-1 (7348) In Process
Inspiron 13 2-in-1 (7353) 1.18.2
Inspiron 13 2-in-1 (7359) 1.18.2
Inspiron 13 2-in-1 (7373) In Process
Inspiron 13 2-in-1 (7378) In Process
Inspiron 14 (3459) 1.5.3
Inspiron 14 (3462) 1.9.2
Inspiron 14 (3467) In Process
Inspiron 14 (3468) In Process
Inspiron 14 (5439) In Process
Inspiron 14 (5468) In Process
Inspiron 14 (7437) In Process
Inspiron 14 (7460) In Process
Inspiron 14 Gaming (7466) 1.2.1
Inspiron 14 Gaming (7467) In Process
Inspiron 15 (3559) 1.5.3
Inspiron 15 (3567) In Process
Inspiron 15 (3568) In Process
Inspiron 15 (5566) In Process
Inspiron 15 (5567) In Process
Inspiron 15 (7537) In Process
Inspiron 15 (7559) 1.2.7
Inspiron 15 (7560) In Process
Inspiron 15 (7572) In Process
Inspiron 15 2-in-1 (5568) 1.15.2
Inspiron 15 2-in-1 (5578) In Process
Inspiron 15 2-in-1 (5579) In Process
Inspiron 15 2-in-1 (7568) 1.18.2
Inspiron 15 2-in-1 (7569) 1.15.2
Inspiron 15 2-in-1 (7573) In Process
Inspiron 15 2-in-1 (7579) In Process
Inspiron 15 Gaming (5577) In Process
Inspiron 15 Gaming (7566) 1.2.1
Inspiron 15 Gaming (7567) In Process
Inspiron 15 Gaming (7577) In Process
Inspiron 15R (5537) In Process
Inspiron 17 (5767) In Process
Inspiron 17 (7737) In Process
Inspiron 17 (7746) In Process
Inspiron 17 2-in-1 (7773) In Process
Inspiron 17 2-in-1 (7778) 1.15.2
Inspiron 17 2-in-1 (7779) In Process
Inspiron 17R (5737) In Process
Inspiron 20 AIO (3052) In Process
Inspiron 20 AIO (3059) 2.8.1
Inspiron 20 AIO (3064) In Process
Inspiron 22 (3263) 1.7.0
Inspiron 22 AIO (3263) 1.7.0
Inspiron 22 AIO (3264) In Process
Inspiron 23 (5348) In Process
Inspiron 2350 In Process
Inspiron 24 AIO (3452) In Process
Inspiron 24 AIO (3459) 2.8.1
Inspiron 24 AIO (3464) In Process
Inspiron 24 AIO (5459) 2.8.0
Inspiron 24 AIO (5488) In Process
Inspiron 24 AIO (7459) 1.7.1
Inspiron 3147 In Process
Inspiron 3148 In Process
Inspiron 3250 3.5.2
Inspiron 3252 In Process
Inspiron 3268 In Process
Inspiron 3458 In Process
Inspiron 3476 In Process
Inspiron 3537 In Process
Inspiron 3558 In Process
Inspiron 3576 In Process
Inspiron 3650 3.5.2
Inspiron 3662 2.5.0
Inspiron 3668 In Process
Inspiron 3737 In Process
Inspiron 5370 In Process
Inspiron 5442 In Process
Inspiron 5447 In Process
Inspiron 5452 In Process
Inspiron 5457 1.3.2
Inspiron 5458 In Process
Inspiron 5459 1.4.1
Inspiron 5542 In Process
Inspiron 5547 In Process
Inspiron 5552 In Process
Inspiron 5557 1.3.2
Inspiron 5558 In Process
Inspiron 5559 1.4.1
Inspiron 5570 In Process
Inspiron 5758 In Process
Inspiron 5759 1.4.1
Inspiron 5770 In Process
Inspiron 7347 In Process
Inspiron 7370 In Process
Inspiron 7472 In Process
Inspiron 7548 In Process
Inspiron 7558 In Process
Inspiron 7570 In Process
Latitude 3150 In Process
Latitude 3160 In Process
Latitude 3180 1.3.0
Latitude 3189 1.3.0
Latitude 3330 In Process
Latitude 3340 In Process
Latitude 3350 In Process
Latitude 3379 1.0.21
Latitude 3380 In Process
Latitude 3390 2-in-1 In Process
Latitude 3450 In Process
Latitude 3460 In Process
Latitude 3470 1.10.1
Latitude 3480 In Process
Latitude 3490 In Process
Latitude 3540 In Process
Latitude 3550 In Process
Latitude 3560 In Process
Latitude 3570 1.10.1
Latitude 3580 In Process
Latitude 3590 In Process
Latitude 5175 1.0.29
Latitude 5179 1.0.29
Latitude 5280 In Process
Latitude 5285 In Process
Latitude 5288 In Process
Latitude 5289 In Process
Latitude 5290 In Process
Latitude 5290 2-in-1 In Process
Latitude 5404 In Process
Latitude 5414 1.15.0
Latitude 5480 In Process
Latitude 5488 In Process
Latitude 5490 In Process
Latitude 5580 In Process
Latitude 5590 In Process
Latitude 7202 In Process
Latitude 7204 In Process
Latitude 7212 In Process
Latitude 7214 1.15.0
Latitude 7275 1.1.34
Latitude 7280 In Process
Latitude 7285 In Process
Latitude 7290 In Process
Latitude 7350 In Process
Latitude 7370 1.15.3
Latitude 7380 In Process
Latitude 7389 In Process
Latitude 7390 In Process
Latitude 7390 2-in-1 In Process
Latitude 7404 In Process
Latitude 7414 1.15.0
Latitude 7480 In Process
Latitude 7490 In Process
Latitude E5250 In Process
Latitude E5270 1.18.6
Latitude E5430 In Process
Latitude E5430 vPro In Process
Latitude E5440 In Process
Latitude E5450 In Process
Latitude E5470 1.18.6
Latitude E5530 In Process
Latitude E5530 vPro In Process
Latitude E5540 In Process
Latitude E5550 In Process
Latitude E5570 1.18.6
Latitude E6230 In Process
Latitude E6330 In Process
Latitude E6430 In Process
Latitude E6430 ATG In Process
Latitude E6430S In Process
Latitude E6430U In Process
Latitude E6440 In Process
Latitude E6440 ATG In Process
Latitude E6530 In Process
Latitude E6540 In Process
Latitude E7240 In Process
Latitude E7250 In Process
Latitude E7270 1.18.5
Latitude E7440 In Process
Latitude E7450 In Process
Latitude E7470 1.18.5
OptiPlex 3010 In Process
OptiPlex 3011 AIO In Process
OptiPlex 3020 In Process
OptiPlex 3020M In Process
OptiPlex 3030 In Process
OptiPlex 3040 1.6.1
OptiPlex 3046 1.3.1
OptiPlex 3050 In Process
OptiPlex 3050 AIO In Process
OptiPlex 3240 AIO 1.5.21
OptiPlex 5040 1.8.1
OptiPlex 5050 In Process
OptiPlex 5250 In Process
OptiPlex 7010 In Process
OptiPlex 7020 In Process
OptiPlex 7040 1.8.1
OptiPlex 7050 In Process
OptiPlex 7440 AIO 1.8.6
OptiPlex 7450 In Process
OptiPlex 9010 In Process
OptiPlex 9010 AIO In Process
OptiPlex 9020 In Process
OptiPlex 9020 AIO In Process
OptiPlex 9020M In Process
OptiPlex 9030 In Process
OptiPlex XE2 In Process
Precision 3420 Tower In Process
Precision 3510 1.18.6
Precision 3520 In Process
Precision 3620 Tower In Process
Precision 5510 1.6.1
Precision 5520 In Process
Precision 5720 AIO In Process
Precision 5810 Tower In Process
Precision 5810 XL Tower In Process
Precision 5820 XL Tower In Process
Precision 7510 1.15.4
Precision 7520 In Process
Precision 7710 1.15.4
Precision 7720 In Process
Precision 7810 Tower In Process
Precision 7810 XL Tower In Process
Precision 7820 Tower In Process
Precision 7910 Tower In Process
Precision 7910 XL Tower In Process
Precision 7920 Tower In Process
Precision M2800 In Process
Precision M4700 In Process
Precision M4800 In Process
Precision M6700 In Process
Precision M6800 In Process
Precision R7610 In Process
Precision Rack 7910 In Process
Precision Rack 7920 In Process
Precision T1650 In Process
Precision T1700 In Process
Precision T3610 In Process
Precision T5610 In Process
Precision T7610 In Process
Venue 11 Pro (5130-32Bit) In Process
Venue 11 Pro (5130-64Bit) In Process
Venue 11 Pro (7130) In Process
Venue 11 Pro (7130) MS In Process
Venue 11 Pro (7140) In Process
Vostro 14 (3459) 1.3.1
Vostro 14 (3468) In Process
Vostro 14 (5468) In Process
Vostro 14 (5470) In Process
Vostro 15 (3559) 1.3.1
Vostro 15 (3562) 1.9.2
Vostro 15 (3568) In Process
Vostro 15 (5568) In Process
Vostro 15 (7570) In Process
Vostro 23 (3340) In Process
Vostro 24 (5450) 2.8.0
Vostro 24 (5460 Kaby Lake) In Process
Vostro 24 (5460) 1.4.0
Vostro 3052 In Process
Vostro 3250 3.5.2
Vostro 3252 In Process
Vostro 3267 In Process
Vostro 3268 In Process
Vostro 3458 In Process
Vostro 3558 In Process
Vostro 3650 3.5.2
Vostro 3653 3.5.2
Vostro 3660 In Process
Vostro 3667 In Process
Vostro 3668 In Process
Vostro 3669 In Process
Vostro 5370 In Process
Vostro 5459 1.1.3
Vostro 5471 In Process
Vostro 5560 In Process
XPS 12 (9250) 1.1.34
XPS 13 (9343) In Process
XPS 13 (9350) 1.6.1
XPS 13 (9360) In Process
XPS 13 (9370) In Process
XPS 13 2-in-1 (9365) In Process
XPS 15 (9550) 1.6.1
XPS 15 (9560) In Process
XPS 27 AIO (7760) In Process
XPS 8900 2.2.1
XPS 8910 1.1.5
XPS 8920 In Process
Thin Client Products
Model Number OS Version BIOS Release OS Release
Wyse 3030 Thin Client Windows Embedded Standard 7 In Process In Process
Wyse 3030 LT Thin Client Wyse ThinLinux 1.x (SLES) In Process In Process
Wyse 3040 Thin Client Wyse ThinLinux 1.x (SLES) In Process In Process
Wyse 5010 Thin Client Windows Embedded Standard 7, Windows Embedded Standard 7 Premium, Windows Embedded 8 Standard In Process In Process
Wyse 5020 Thin Client Windows Embedded Standard 7, Windows Embedded Standard 7 Premium, Windows Embedded 8 Standard, WIE10 TH In Process In Process
Wyse 5020 Thin Client Wyse ThinLinux 1.x (SLES) In Process In Process
Wyse 5060 Thin Client Windows Embedded Standard 7 Premium, WIE10 RS In Process In Process
Wyse 5060 Thin Client Wyse ThinLinux 1.x (SLES) In Process In Process
Wyse 7010 Thin Client Windows Embedded Standard 7, Windows Embedded Standard 7 Premium, Windows Embedded 8 Standard In Process In Process
Wyse 7010 Thin Client Wyse ThinLinux 1.x (SLES) In Process In Process
Wyse 7020 Thin Client Windows Embedded Standard 7, Windows Embedded Standard 7 Premium, Windows Embedded 8 Standard, WIE10 TH In Process In Process
Wyse 7020 Thin Client Wyse ThinLinux 1.x (SLES) In Process In Process
Wyse 7040 Thin Client Windows Embedded Standard 7 Premium, WIE10 TH 1.5.4 Available
Latitude 3460 Mobile Thin Client Windows Embedded Standard 7 Premium In Process Available
Latitude E7270 Mobile Thin Client Windows Embedded Standard 7 Premium 1.18.5 Available
Latitude 3480 Mobile Thin Client WIE10 RS In Process Available
Latitude 5280 Mobile Thin Client WIE10 RS In Process Available
Note:
  • ThinOS versions 8.4 and later are not affected.
    ThinOS, by design, is a "closed" OS, i.e., only Dell supplied software can run on ThinOS. There is no web browser or other interface to browse, download or install software on ThinOS. In version 8.4, ThinOS introduced digital signature verification of software updates / packages. Thus, users (including Administrators) cannot download or install other software on ThinOS, including malware that could exploit the vulnerabilities in the underlying CPU. Customers should update their devices to the latest version of ThinOS. Dell will continue to monitor the situation.

OS Patch Guidance

The operating systems listed below are affected and should be updated by following the instructions provided in the advisory for the applicable operating system.

Microsoft Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002

RedHat: https://access.redhat.com/security/vulnerabilities/speculativeexecution

SuSe: https://www.suse.com/support/kb/doc/?id=7022512

Ubuntu: https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown

ChromeOS: https://support.google.com/faqs/answer/7622138#chromeos

References

Intel Security Advisory: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr

AMD Update: http://www.amd.com/en/corporate/speculative-execution

Google Project Zero Blog Post: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html

Research papers: https://meltdownattack.com




Article ID: SLN308587

Last Date Modified: 02/12/2018 02:51 PM


Rate this article

Accurate
Useful
Easy to understand
Was this article helpful?
Yes No
Send us feedback
Comments cannot contain these special characters: <>()\
Sorry, our feedback system is currently down. Please try again later.

Thank you for your feedback.