Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Infineon Trusted Platform Module(TPM)漏洞( CVE -2017-15361) :影响戴尔产品的状态

Summary: 一个新的Infineon Trusted Platform Module(TPM)漏洞( CVE -2017-15361) 已经上升到最高,使用此文章以了解如何保护您的戴尔硬件。

This article may have been automatically translated. If you have any feedback regarding its quality, please let us know using the form at the bottom of this page.

Article Content


Symptoms

戴尔已注意到此漏洞RSA密钥生成方法中标识的台式电脑和操作系统使用受信任的平台模块(TPM)通过 CVE -2017跟踪 -15361。戴尔已完成调查此问题,并仅找到一个小的产品受影响的列表。这些产品与建议的补救步骤列在下面。请参阅修补程序的指导部分的操作系统供应商发布的修补程序的详细信息。

增补程序的指导:

参考资料:

状态的RSA产品中,浏览至:https://community.rsa.com/docs/doc-84619 For status of RSA products, browse to:https://community.rsa.com/docs/DOC-84619

受影响的戴尔产品:

客户端产品
产品 支持的型号 受影响? 建议的操作
Dell Chromebook11 3120,3189,正在生成清洁页。 “Yes(是)” 请按照由Google提供的说明进行操作:
https://sites.google.com/a/chromium.org/dev/chromium-os/tpm_firmware_update
Dell Chromebook13 3380,7310 “Yes(是)” 请按照由Google提供的说明进行操作:
https://sites.google.com/a/chromium.org/dev/chromium-os/tpm_firmware_update
戴尔chromebox   “Yes(是)” 请按照由Google提供的说明进行操作:
https://sites.google.com/a/chromium.org/dev/chromium-os/tpm_firmware_update
Wyse5060 Wes7P、授权WIE10 “Yes(是)” 挂起的建议采取的措施。

Article Properties


Affected Product

Chromebox, Chromebook 3120 (End of Life), Chromebook 11 3180, Chromebook 11 3189, Chromebook 13 3380, Chromebook 7310, Wyse 5060 Thin Client

Last Published Date

21 Feb 2021

Version

3

Article Type

Solution