CPU hardware vulnerable to side-channel attacks(CV-2017-5175, CVE-2017-5753, CVE-2017-5754)

Rev. 1.0
August 3, 2018
Fujitsu Limited

On January 3, 2018 a team of security researchers revealed new vulnerabilities that take advantage of techniques commonly used in many modern processor architectures. Collectively known as Meltdown and Spectre, these vulnerabilities utilize a new method of side-channel analysis and could allow an unprivileged attacker, in specific circumstances, to read privileged memory belonging to other processes or memory allocated to the operating system kernel.

Below are the procedures to protect ETERNUS Storage. For other Fujitsu products, please see CPU hardware vulnerable to side-channel attacks(CVE-2017-5715, CVE-2017-5753, CVE-2017-5754).

Impact on ETERNUS Storage

The ETERNUS Storage shown below are not affected by these security issue.

ProductStatusNecessary updates
All-Flash ArrayETERNUS AF seriesNot affectedFirmware update is not needed
Hybrid Storage SystemsETERNUS DX seriesNot affectedFirmware update is not needed
Hyperscale Storage SystemsETERNUS CD10000Not affectedFirmware update is not needed
Tape systemsETERNUS LT seriesNot affectedFirmware update is not needed
Data Protection ApplianceETERNUS CS800Not affectedFirmware update is not needed
ETERNUS CS8000Not affectedFirmware update is not needed
SwitchesETERNUS SN200 seriesNot affectedFirmware update is not needed
Brocade seriesNot affectedFirmware update is not needed

Details

For more details, please see the following links.

Contact

For further information, please contact your authorized service provider.

Top of Page