Please note that JavaScript and style sheet are used in this website,
Due to
unadaptability of the style sheet with the browser used in your computer, pages may not look as
original.
Even in such a case, however, the contents can be used
safely.
Updated: January 9, 2020
Published: August 8, 2019
Thank you for using NEC Express5800/Storage NS series products.
We have been informed of new vulnerabilities of processors supporting speculative and
out-of-order executions. The following of the vulnerabilities may affect our products:
Any of our products with these vulnerabilities, if attacked by a malicious program, may lead to a
denial of service (DoS) by a remote third party and cause its data to be stolen or falsified.
Please take mitigation measures against the vulnerabilities by checking this page for how to
handle them and what our handling status is.
Exploiting any of the following vulnerabilities, an attack may lead to a
DoS by a remote third party and cause the data of the affected device to be stolen from its memory
or to be falsified:
< Vulnerabilities revealed in May 2019: INTEL-SA-00213, INTEL-SA-00223, and INTEL-SA-00233
>
Regarding all the above vulnerabilities, any of the affected products requires updating its system
BIOS and applying patches to its current operating system.
The following lists the affected products as well as when and where their update patches
will be released.
Please download and apply necessary patches.
< Affected products list and release schedule of module updates >
Please see relevant information released by the operating system vendors.
Note that this application may degrade the performance depending on the usage or load
of your product.