fbpx
Home/Security Statement

Wiwynn Statement on Intel Platform Update 2020.2

Wiwynn Statement on Intel Platform Update 2020.2 On November 10, 2020, Intel released several security advisories and functional updates as part of the 2020.2 Intel Platform Update (IPU).  Several Wiwynn’s Intel processor-based servers are affected. Details and further reference are listed as below. Wiwynn have been working with Intel to deliver updating system firmware in the near future. Customers can contact techsupport@wiwynn.com  for further supports. Security & functional update Impacted processors Cascadelake SP Impacted products EP100, SV7220G3, SV300G3, SV302G3 Related Intel Security Advisory INTEL-SA-00358 2020.2 IPU – BIOS Advisory INTEL-SA-00390 Intel BIOS Platform Sample Code Advisory [...]

2020-11-11T11:00:13+08:00November 11th, 2020|Categories: Security Statement|

Wiwynn Statement on 2020.1 Intel Platform Update

Wiwynn Statement on 2020.1 Intel Platform Update On June 9, 2020, Intel released several security advisories and functional updates as part of the 2020.1 Intel Platform Update (IPU).  Wiwynn’s servers based on Intel Xeon® Processor Scalable Family and D Family are affected. Details and further reference are as below. Wiwynn have been working with Intel to deliver updating system firmware in the near future. Customers can contact techsupport@wiwynn.com  for further supports. Security & functional update Impacted processors Cascadelak SP, Skylake SP, Skylake-D Impacted products SV300G3, SV302G3, SV7220G3, SV7100G2 Related Intel Security Advisory INTEL-SA-00295 2020.1 IPU - Intel® [...]

2020-09-28T14:01:28+08:00June 10th, 2020|Categories: Security Statement|

Wiwynn Statement on Intel Platform Update

Wiwynn Statement on Intel Platform Update On November 12, 2019, Intel released several security advisories and functional updates as part of the 2019.2 Intel Platform Update (IPU).  Wiwynn’s servers based on Intel Xeon® Processor Scalable Family, D Family and E5 v4 Family (Broadwell EP) are related. Details and further references are as below. Wiwynn has been working with Intel to deliver updating system firmware in the near future. Customers can contact techsupport@wiwynn.com  for further supports. Microcode update Impacted processors Cascadelak SP, Skylake SP, Skylake-D, Broadwell EP, Impacted products SV300G3, SV302G3, SV7220G3 SV7000G2, SV300G2, SV320G2, SV7221G2 Security & functional update Related Intel Security Advisory INTEL-SA-00241 [...]

2020-11-11T11:18:20+08:00November 12th, 2019|Categories: Security Statement|

Wiwynn Statement on “RAMBleed” Issue

On June 11, researchers published a paper entitled “RAMBleed Reading Bits in Memory without Accessing Them”.  RAMBleed describes attacks on DRAM modules that are already susceptible to Rowhammer style attacks. Systems using DRAM modules mitigated against Rowhammer style attacks remain protected from RAMBleed. On certain microprocessors, the researchers describe a method to reveal partial physical memory address information that does not contain user secrets. This information is not required to enable RAMBleed, and even with revelation of this information, systems with DRAM modules mitigated against Rowhammer style attacks remain protected against RAMBleed. Wiwynn’s servers based on Intel Xeon® Processor E5 v3 Family  (Haswell [...]

2020-11-11T11:18:21+08:00June 12th, 2019|Categories: Security Statement|

Wiwynn Statement on Security Vulnerability (Intel-SA-00233/00213/00223)

Wiwynn Statement on Security Vulnerability (Intel-SA-00233/00213/00223) Wiwynn have been notified of several security vulnerabilities and several Wiwynnn’s Intel-processor based servers are affected. Details and further reference are as below. We are working with Intel for mitigations by updating system firmware in the coming future. Customers can contact techsupport@wiwynn.com for further supports. Intel-SA-00233 Summary This is related to a sub-class of speculative execution side-channel vulnerabilities called Microarchitectural Data Sampling (MDS) for several Intel processors. MDS is similar to previously disclosed speculative execution side channel vulnerabilities. A potential security vulnerability in CPUs may allow information disclosure. Related CVEs CVE-2018-12127, CVE-1018-12126, CVE-2018-12130, CVE-2019-11091. Impacted processors [...]

2020-11-11T11:18:24+08:00May 15th, 2019|Categories: Security Statement|

Wiwynn Statement on Security Vulnerability (Intel SA-00191)

Wiwynn Statement on Security Vulnerability (Intel SA-00191) Wiwynn have been notified about a privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware (CVE-2018-12204) which may potentially allow privileged user to potentially execute arbitrary code via local access. We have identified our Intel Skylake and Skylake-D-based servers are affected and have been working with Intel and independent BIOS vendors for mitigations by updating system firmware with the reference code (RC) Intel has already provided. We will release new BIOS for SV7220G3, SV5100G3 and SV300G3 with the schedule below and will keep you posted once new updates are available Customers can also [...]

2020-11-11T11:18:27+08:00March 13th, 2019|Categories: Security Statement|