Infineon Trusted Platform Module (TPM) Vulnerability (CVE-2017-15361) : Impact Status on Dell Products

Summary: A new Infineon Trusted Platform Module (TPM) vulnerability (CVE-2017-15361) has risen, use this article to find out how to protect your Dell hardware.

Article Content


Symptoms

Dell is aware of a vulnerability identified in the RSA key generation method used by Infineon Trusted Platform Modules (TPMs) tracked through CVE-2017-15361. Dell has completed investigation on this issue and found only a small list of products affected. These products are listed below with recommended remediation steps. Please refer to the Patch Guidance section for details on patches published by Operating System vendors.

Patch Guidance:

References:

For status of RSA products, browse to: https://community.rsa.com/docs/DOC-84619

Dell Products Affected:

Client Products
Product Supported Models Impacted? Recommended Action
Dell Chromebook 11 3120, 3180, 3189 YES Please follow the instructions provided by Google:
https://sites.google.com/a/chromium.org/dev/chromium-os/tpm_firmware_update.
Dell Chromebook 13 3380, 7310 YES Please follow the instructions provided by Google:
https://sites.google.com/a/chromium.org/dev/chromium-os/tpm_firmware_update.
Dell Chromebox   YES Please follow the instructions provided by Google:
https://sites.google.com/a/chromium.org/dev/chromium-os/tpm_firmware_update.
Wyse 5060 WES7P, WIE10 YES Pending Recommended Action.

Article Properties


Affected Product

Chromebox, Chromebook 3120, Chromebook 11 3180, Chromebook 11 3189, Chromebook 13 3380, Chromebook 7310, Wyse 5060 Thin Client

Last Published Date

21 Feb 2021

Version

3

Article Type

Solution

Rate This Article


Accurate
Useful
Easy to Understand
Was this article helpful?

0/3000 characters