![]() ![]() Dell Encryption BitLocker Manager ( EMAgent) v18.16.1 or later.Dell Encryption Personal for Self-Encrypting Drives ( EMAgent) v8.16.1 or later.Dell Encryption Enterprise for Self-Encrypting Drives ( EMAgent) v8.16.1 or later.Dell Encryption External Media v8.17 or later.Dell Encryption Personal v8.17 or later.Dell Encryption Enterprise v8.17 or later. ![]() ĭell Data Security has validated compatibility against the latest set of Microsoft patches from January 2018 with: For more information about Microsoft’s response to Meltdown and Spectre, go to. Microsoft January 2018 update release contains a series of updates to help mitigate exploitation by the Meltdown/Spectre vulnerabilities. The Dell Data Security software may help prevent exploits from being successful, but is not a substitute for taking the manufacturer’s recommended steps for remediation. Apply the applicable operating system updates according to the operating system vendor guidance.Īll Dell Data Security customers with affected hardware (Dell or non-Dell in origin) must apply the recommended remediation as outlined by their manufacturer.Apply the processor microcode update using BIOS update per manufacturer instructions. ![]() In general, there are two essential components that must be applied to mitigate the above mentioned vulnerabilities. More information about these vulnerabilities and responses from other vendors, go to. For Dell computers, affected computers can be found at: Meltdown/Spectre (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754) impact on Dell Products. All customers should verify whether they are affected by going to the support sites of their hardware manufacturer. This means that a large range of products are affected from desktops and laptops to servers and storage, even smartphones. The issue is not specific to any one vendor and takes advantage of techniques that are commonly used in most of the modern processor architectures. This could lead to access to sensitive information stored in system memory. Systems with microprocessors using speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access using a side-channel analysis of the data cache. The vulnerabilities that are known as Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5715 /CVE-2017-5753) have been discovered in the central processing unit (CPU) performance feature called speculative execution. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |