Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Speculative Store ByPass (CVE-2018-3639, CVE-2018-3640) impact on Dell products

Summary: Dell is investigating the side-channel vulnerabilities known as Speculative Store Bypass (CVE-2018-3639) and Rogue System Register Read (CVE-2018-3640) affecting many modern microprocessors used in Dell products. For more information, please refer to the resources and links. ...

This article may have been automatically translated. If you have any feedback regarding its quality, please let us know using the form at the bottom of this page.

Article Content


Symptoms

Dell is investigating the side-channel vulnerabilities known as Speculative Store Bypass (CVE-2018-3639) and Rogue System Register Read (CVE-2018-3640) affecting many modern microprocessors used in Dell products. For more information, please review the security updates posted by Intel. We are working with Intel and others in the industry to address these issues.

Depending on the affected product, mitigations may include updates to firmware, system software and certain software components. Dell recommends adherence to industry standard security best practices including but not limited to timely software updates, avoiding unknown hyperlinks, websites and files or applications from unknown sources, using up-to-date anti-virus and other advanced threat protection solutions.

SLN318302_en_US__1icon Note: You can change the language on many of the web page(s), once you are on their site.

 

For more information on affected products and next steps, please refer to the following resources which will be updated regularly as new information becomes available. The following links will direct you to the support pages for specific Dell Technologies products:

References

While related to the Spectre-Meltdown vulnerabilities disclosed in January, a new set of microcode and operating system updates are required to mitigate these newly discovered vulnerabilities.

Article Properties


Last Published Date

21 Feb 2021

Version

5

Article Type

Solution