Please note that JavaScript and style sheet are used in this website,
Due to
unadaptability of the style sheet with the browser used in your computer, pages may not look as
original.
Even in such a case, however, the contents can be used
safely.
Published: Dec 27, 2019
Thank you for using NEC Express5800 products
We have been informed of new vulnerabilities of processors supporting speculative and
out-of-order executions. The following vulnerabilities may affect our products:
Any of our products with these vulnerabilities, if attacked by a malicious program, may lead to a
denial of service (DoS) by a remote third party and
cause its data to be stolen or falsified.
Please take mitigation measures against the vulnerabilities by checking this page for how to
handle them and what our handling status is.
Exploiting any of the following vulnerabilities, an attack may lead to a DoS by a remote third party
and cause the data of
the affected device to be stolen from its memory or to be falsified:
< Vulnerability information reported in November 2019:INTEL-SA-00164, INTEL-SA-00210,
INTEL-SA-00220, INTEL-SA-00240,
INTEL-SA-00241, INTEL-SA-00255, INTEL-SA-00270, INTEL-SA-00271, INTEL-SA-00280, INTEL-SA-00313
>
Regarding all the above vulnerabilities, any of the affected products requires updating its system
BIOS and applying patches to its current operating system.
The following lists the affected products as well as when and where their update patches
will be released.
Please download and apply necessary patches.
< Affected products list and release schedule of module updates >
Please see relevant information released by the operating system vendors.
Note that this application may degrade the performance depending on the usage or load of
your product.