<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2569132&amp;fmt=gif">
Skip to the main content.

Wiwynn Statement on “RAMBleed” Issue

Wiwynn Statement on “RAMBleed” Issue

On June 11, researchers published a paper entitled “RAMBleed Reading Bits in Memory without Accessing Them”.  RAMBleed describes attacks on DRAM modules that are already susceptible to Rowhammer style attacks. Systems using DRAM modules mitigated against Rowhammer style attacks remain protected from RAMBleed. On certain microprocessors, the researchers describe a method to reveal partial physical memory address information that does not contain user secrets. This information is not required to enable RAMBleed, and even with revelation of this information, systems with DRAM modules mitigated against Rowhammer style attacks remain protected against RAMBleed.

Wiwynn’s servers based on Intel Xeon® Processor E5 v3 Family  (Haswell EP) are related to this issue. Utilizing DRAM modules resistant to Rowhammer style attacks is recommended.  This includes the majority of DDR4 DRAM modules.

Customers can contact techsupport@wiwynn.com for further supports and
find more information from Intel-SA-00247.

Wiwynn Statement on Intel Security Advisories Published on June 14th

Wiwynn Statement on Intel Security Advisories Published on June 14th

On June 14, 2022, Intel released security advisories addressing 6 CVEs as part of its ongoing vulnerability remediation processes. Several...

Read More
Wiwynn Statement on 2020.1 Intel Platform Update

Wiwynn Statement on 2020.1 Intel Platform Update

On June 9, 2020, Intel released several security advisories and functional updates as part of the 2020.1 Intel Platform Update (IPU). Wiwynn’s...

Read More
Wiwynn Statement on Intel Platform Update 2021.1

Wiwynn Statement on Intel Platform Update 2021.1

On June 8, 2021, Intel released several security advisories and functional updates as part of the 2021.1 Intel Platform Update (IPU). Several...

Read More