Please note that JavaScript and style sheet are used in this website,
Due to unadaptability of the style sheet with the browser used in your computer, pages may not look as
original.
Even in such a case, however, the contents can be used safely.
Updated: December 27, 2019
Published: January 24, 2018
Thank you for your continued patronage for NEC Express5800 series products.
New Vulnerabilities (CVE-2018-3615, CVE-2018-3620, CVE-2018-3646) have been recently found in
processors supporting speculative execution and out-of-order execution features. These
vulnerabilities could allow malicious programs to steal data stored in memory from the affected
products.
Previously, this page addressed processors targeted with similar feature functions (referenced
below).
Due to the similarities of these new vulnerabilities, countermeasures need to be taken in terms
of both the system BIOS and the operating system.
January 2018(CVE-2017-5715、CVE-2017-5753、CVE-2017-5754)
May 2018(CVE-2018-3639、CVE-2018-3640)
Since August of 2018, details regarding these new vulnerabilities, countermeasures and
announcements as well as details as to the current situation have been made available on this page.
We will continue to release additional information as it becomes available.
For any of the vulnerabilities stated above, it is necessary to update the system BIOS of the
applicable products and to apply a patch to the current operating system.
Please refer to the product list below for affected models and thier respective updates.
Download and apply all relevant update modules.
Countermeasures for the vulnerabilities announced in August 2018
(CVE-2018-3615、CVE-2018-3620、CVE-2018-3646) are the same as those vulnerabilities reported
in May 2018 (CVE-2018-3639, CVE-2018-3640).
Please refer to information on security updates published by respective operating system
vendors.
Note that some updates may reduce your system’s processing performance depending on the
usage load of your system.