CPU hardware vulnerable to side-channel attacks(CVE-2018-3639, CVE-2018-3640)

Rev. 1.0
August 3, 2018
Fujitsu Limited

The vulnerability Variant 3a and Variant 4 is a derivative of side channel methods previously disclosed in January. Like the other variants, Variant 3a and Variant 4 uses speculative execution, a feature common to most modern processor architectures, to potentially expose certain kinds of data through a side channel.

Below are the procedures to protect ETERNUS Storage. For other Fujitsu products, please see CPU hardware vulnerable to side-channel attacks(CVE-2018-3639, CVE-2018-3640).

Impact on ETERNUS Storage

The ETERNUS Storage shown below are not affected by these security issue.

ProductStatusNecessary updates
All-Flash ArrayETERNUS AF seriesNot affectedFirmware update is not needed
Hybrid Storage SystemsETERNUS DX seriesNot affectedFirmware update is not needed
Hyperscale Storage SystemsETERNUS CD10000Not affectedFirmware update is not needed
Tape systemsETERNUS LT seriesNot affectedFirmware update is not needed
Data Protection ApplianceETERNUS CS800Not affectedFirmware update is not needed
ETERNUS CS8000Not affectedFirmware update is not needed
SwitchesETERNUS SN200 seriesNot affectedFirmware update is not needed
Brocade seriesNot affectedFirmware update is not needed

Details

For more details, please see the following links.

Contact

For further information, please contact your authorized service provider.

Top of Page