Intel® Q2 Security Update on Side-Channel Analysis Method Vulnerability
Security researchers identified two software analysis methods that, if used for malicious purposes, have the potential to improperly gather sensitive data from computing devices with most modern processor architectures and operating systems.
For more information on the Intel® security vulnerabilities, please visit the Intel® Security Center website for further details.
Fujitsu strongly advises all customers to update affected products. Updates are provided through BIOS updates. This page will be updated regularly as soon as new information is available.
- It is necessary to update the BIOS.
- Consult the list of affected Fujitsu systems for the timing of BIOS availability.
- To download the respective updates for your system, please go to the Fujitsu Support page and perform the following steps:
- Select Product.
- Select Series.
- Select Model.
- Press Go.
- Download and install the latest BIOS update package.
A number of Fujitsu products are affected by these vulnerabilities. Fujitsu is working to distribute patches for all affected products that are currently supported. Older systems that are no longer supported will not be patched. An overview of the Fujitsu affected products can be found here:
|Model Name||Update Type||Release Date1|
|LIFEBOOK P728||BIOS||July 2018 V1.09|
|LIFEBOOK T938||BIOS||July 2018 V1.08|
|LIFEBOOK U728||BIOS||July 2018 V1.12|
|BIOS||July 2018 V1.12|
|BIOS||July 2018 V1.12|
|LIFEBOOK U938||BIOS||July 2018 V1.12|
|STYLISTIC Q738||BIOS||December 2018 V1.08|
|BIOS||non-vPro February 2020 V1.19
vPro February 2020 V1.19
|LIFEBOOK P727||BIOS||October 2018 V1.15|
|LIFEBOOK T937||BIOS||October 2018 V1.16|
|LIFEBOOK U727||BIOS||December 2018 V1.22|
|BIOS||December 2018 V1.22|
|LIFEBOOK U937||BIOS||October 2018 V1.13|
|STYLISTIC Q737||BIOS||December 2018 V1.14|
|BIOS||non-vPro February 2019 V1.31
vPro February 2019 V1.22
|BIOS||non-vPro February 2019 V1.33
vPro February 2019 V1.25
|LIFEBOOK T726||BIOS||December 2018 V1.18|
|LIFEBOOK T936||BIOS||January 2019 V1.18|
|LIFEBOOK U727 6th Gen||BIOS||October 2018 V1.09|
|LIFEBOOK U747 6th Gen
LIFEBOOK U757 6th Gen
|BIOS||October 2018 V1.09|
|STYLISTIC Q616||BIOS||February 2019 V1.15|
|STYLISTIC Q736||BIOS||February 2019 V1.18|
|STYLISTIC R726||BIOS||March 2020 V1.22|
|LIFEBOOK T725||BIOS||February 2019 V1.21|
|LIFEBOOK T935||BIOS||February 2019 V1.21|
|LIFEBOOK U745||BIOS||February 2019 V1.23|
|STYLISTIC Q665||BIOS||February 2019 V1.17|
|STYLISTIC Q775||BIOS||February 2019 V1.22|
|BIOS||August 2019 V1.14|
|BIOS||August 2019 V1.26|
|LIFEBOOK T734||BIOS||June 2019 V1.16|
|LIFEBOOK T904||BIOS||June 2019 V1.19|
|LIFEBOOK U904||BIOS||August 2019 V1.18|
|STYLISTIC Q704||BIOS||non-vPro May 2019 V1.35
vPro February 2019 V1.40
|1. Dates are subject to change|
* Please note that this information is subject to change without any prior notice.
Note: Fujitsu does not manufacture the affected microprocessors that Fujitsu buys from third party suppliers and integrates into its products. Therefore, this communication is based on the information and recommendations Fujitsu has received from the third party suppliers of the affected microprocessors. Fujitsu does not warrant that this communication is applicable or complete for all customers and all situations. Fujitsu recommends that customers determine the applicability of this communication to their individual situation and take appropriate measures. Fujitsu is not liable for any damages or other negative effects resulting from customers’ use of this communication. All details of this communication are provided "as is" without any warranty or guarantee. Fujitsu reserves the right to change or update this communication at any time. Websites of other companies referred to in this communication are the sole responsibility of such other companies. Fujitsu does not assume any liability with respect to any information and materials provided by its suppliers, including on such websites. Designations may be protected by trademarks and/or copyrights of Fujitsu or the respective owners, the use of which by third parties for their own purposes may infringe the rights of such owners.