my-tracker_cpte

Security Vulnerabilities Table

Tables below outline BIOS versions for the Supermicro products that are affected by various Security Advisories (SA).

 

The following table shows the impacted motherboards and the BIOS or Management Software version necessary to address the given issue. If you know the Supermicro system, but not the motherboard, go to the System webpage and look for the « Integrated Motherboard » information. Fixes implemented in an earlier version are carried forward into future versions ( e.g. issues fixed in 2.0a are also fixed in 3.0a).

The following X11 generation Supermicro Motherboards are impacted by this issue.
Additional systems will be added to this list as information becomes available.

System Listings:   |  X11 DP |  X11 UP |  X11 MP |  X11 Embedded/Workstation/Desktop |  X11 SuperBlade/MicroBlade/MicroCloud |

  Dual Processor (2S) X11 Systems

Intel QSR 2019.1 Intel QSR 2018.4 Spectre Meltdown BMC Virtual Media CVE-2019-6260
Intel Advisory Intel-SA-00213 Intel-SA-00223 Intel-SA-00233 Intel-SA-00185 Intel-SA-00191 Intel-SA-00088 Intel-SA-00115 Intel-SA-00161
Motherboard BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BMC Version BMC Version
X11DAi-N v 3.1 Not Affected v 3.1 v 3.0a v 3.0a v 2.0b v 2.0b v 2.0b v 1.71.5 v 1.69
X11DAC v 3.1 Not Affected v 3.1 special order special order v 2.1 v 2.1 v 2.1 v 1.71.5 v 1.69
X11DPH-Tq v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.1 v 2.1 v 2.1 v 1.71.5 v 1.67
X11DPH-i v 3.1 Not Affected v 3.1 v 3.0a v 3.0a v 2.1 v 2.1 v 2.1 v 1.71.5 v 1.67
X11DPH-T v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.1 v 2.1 v 2.1 v 1.71.5 v 1.67
X11DPS-RE v 3.1 Not Affected v 3.1 v 3.0a v 3.0a v 2.1 v 2.1 v 2.1 v 1.71.5 v 3.67
X11DSF-E v 3.1 Not Affected v 3.1 v 3.0 v 3.0c v 2.1 v 2.1 v 2.1 v 1.71.5 v 3.68V
X11DSN-TS v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.1 v 2.1 v 2.1 v 1.71.5 Pending
X11DSN-TSQ v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.1 v 2.1 v 2.1 v 1.71.5 Pending
X11DSC+ v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.1 v 2.1 v 2.1 v 1.71.5 v 1.68
X11DDW-NT v 3.1 Not Affected v 3.1 v 2.2a v 3.0c v 2.2 v 2.2 v 2.2 v 1.71.5 v 1.69
X11DDW-L v 3.1 Not Affected v 3.1 v 2.2a v 3.0c v 2.2 v 2.2 v 2.2 v 1.71.5 v 1.69
X11DGQ v 3.1 Not Affected v 3.1 v 3.0a v 3.0a v 2.0b v 2.0b v 2.0b v 1.71.5 v 1.68
X11DPFF-SN v 3.1 Not Affected v 3.1 v 3.0a v 3.0a v 2.1 v 2.1 v 2.1 v 1.71.5 v 1.68
X11DPFR-SN v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.1a v 2.1a v 2.1a v 1.71.5 v 1.69
X11DPFR-S v 3.1 Not Affected v 3.1 v 3.0a v 3.0a v 2.1a v 2.1a v 2.1a v 1.71.5 v 1.69
X11DPT-PS v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.1 v 2.1 v 2.1 v 1.71.5 v 1.69
X11DPT-B v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.1a v 2.1a v 2.1a v 1.71.5 v 1.70
X11DPT-BH v 3.1 Not Affected v 3.1 v 2.1a Not Affected v 2.1a v 2.1a v 2.1a v 1.71.5 v 1.70
X11DPT-L v 3.1 Not Affected v 3.1 v 3.0c v 3.0c v 2.1 v 2.1 v 2.1 v 1.71.5 v 3.68V
X11DPU v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.1b v 2.1b v 2.1b v 1.71.5 v 1.69
X11DPU-V v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.1b v 2.1b v 2.1b v 1.71.5 v 3.61V
X11DPU-X v 3.1 Not Affected v 3.1 v 3.0a v 3.0a v 2.0c v 2.0c v 2.0c v 1.71.5 v 1.69
X11DPU-XLL v 3.1 Not Affected v 3.1 v 3.0a v 3.0a v 2.0c v 2.0c v 2.0c v 1.71.5 v 1.69
X11DPU-Z+ v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.0b v 2.0b v 2.0b v 1.71.5 v 1.64
X11DPU-ZE+ v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.0b v 2.0b v 2.0b v 1.71.5 v 1.64
X11DPG-SN v 3.1 Not Affected v 3.1 v 3.0a v 3.0a v 2.2 v 2.2 v 2.2 v 1.71.5 v 1.69
X11DPG-QT v 3.1 Not Affected v 3.1 v 3.0b v 3.0c v 3.0a v 3.0a v 3.0a v 1.71.5 v 1.69
X11DPG-OT-CPU v 3.1 Not Affected v 3.1 v 3.0a v 3.0a v 2.1 v 2.1 v 2.1 v 1.71.5 v 1.70
X11DPi-NT v 3.1 Not Affected v 3.1 v 3.0a v 3.0a v 2.1 v 2.1 v 2.1 v 1.71.5 v 1.69
X11DPi-N v 3.1 Not Affected v 3.1 v 3.0a v 3.0a v 2.1 v 2.1 v 2.1 v 1.71.5 v  1.69
X11DPL-I v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.1 v 2.1 v 2.1 v 1.71.5 Pending
X11DPX-T v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.0c v 2.0c v 2.0c v 1.71.5 v 1.69
X11DGO-T v 3.1 Not Affected v 3.1 v 3.0a v 3.0a v 2.1 v 2.1 v 2.1 v 1.71.5 Pending

  Single Processor (1P) X11 Systems (top)

Intel QSR 2019.1 Intel QSR 2018.4 Spectre Meltdown BMC Virtual Media CVE-2019-6260
Intel Advisory Intel-SA-00213 Intel-SA-00223 Intel-SA-00233 Intel-SA-00185 Intel-SA-00191 Intel-SA-00088 Intel-SA-00115 Intel-SA-00161
Motherboard BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BMC Version BMC Version
X11SCA v 1.0c Not Affected v 1.0c Pending v 1.0b v 1.0a v 1.0a v 1.0a v 1.71.5 not applicable
X11SCA-F v 1.0c Not Affected v 1.0c v 1.0b v 1.0b v 1.0a v 1.0a v 1.0a v 1.71.5 Pending
X11SCH-F v 1.0b Not Affected v 1.0b v 1.0a v 1.0b v 1.0a v 1.0a v 1.0a v 1.71.5 v 1.54
X11SCH-LN4F v 1.0b Not Affected v 1.0b v 1.0a v 1.0b v 1.0a v 1.0a v 1.0a v 1.71.5 v 1.54
X11SCA-W v 1.0c Not Affected v 1.0c v 1.0a v 1.0b v 1.0a v 1.0a v 1.0a v 1.71.5 not applicable
X11SCL-F v 1.0b Not Affected v 1.0b v 1.0a v 1.0b v 1.0a v 1.0a v 1.0a v 1.71.5 v 1.22
X11SCL-LN4F v 1.0b Not Affected v 1.0b v 1.0a v 1.0b v 1.0a v 1.0a v 1.0a v 1.71.5 v 1.22
X11SCL-IF v 1.0b Not Affected v 1.0b v 1.0a v 1.0b v 1.0a v 1.0a v 1.0a v 1.71.5 v 1.22
X11SCM-F v 1.0b Not Affected v 1.0b v 1.0a v 1.0b v 1.0a v 1.0a v 1.0a v 1.71.5 v 1.22
X11SCM-LN8F v 1.0b Not Affected v 1.0b v 1.0a v 1.0b v 1.0a v 1.0a v 1.0a v 1.71.5 v 1.22
X11SCW-F v 1.0b Not Affected v 1.0b v 1.0a v 1.0b v 1.0a v 1.0a v 1.0a v 1.71.5 v 3.68
X11SPA-T v 3.1 Not Affected v 3.1 v 3.0 v 3.0c Not Afffected Not Afffected Not Afffected v 1.71.5 v 3.71
X11SPA-TF v 3.1 Not Affected v 3.1 v 3.0 v 3.0c Not Afffected Not Afffected Not Afffected v 1.71.5 v 3.71
X11SPi-TF v 3.1 Not Affected v 3.1 v 3.0b v 3.0c v 2.1 v 2.1 v 2.1 v 1.71.5 v 1.69
X11SPL-F v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.1 v 2.1 v 2.1 v 1.71.5 v 1.69
X11SPM-F v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.1 v 2.1 v 2.1 v 1.71.5 v 1.68
X11SPM-TF v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.1 v 2.1 v 2.1 v 1.71.5 v 1.68
X11SPM-TPF v 3.1 Not Affected v 3.1 v 3.0c v 3.0c v 2.1 v 2.1 v 2.1 v 1.71.5 v 1.68
X11SPH-nCTF v 3.1 Not Affected v 3.1 v 3.0b v 3.0b v 2.1 v 2.1 v 2.1 v 1.71.5 v 1.69
X11SPH-nCTPF v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.1 v 2.1 v 2.1 v 1.71.5 v 1.69
X11SPW-TF v 3.1 Not Affected v 3.1 v 3.0b v 3.0b v 2.1a v 2.1a v 2.1a v 1.71.5 v 1.69
X11SPW-CTF v 3.1 Not Affected v 3.1 v 3.0b v 3.0c v 2.1a v 2.1a v 2.1a v 1.71.5 v 1.69
X11SPG-TF v 3.1 Not Affected v 3.1 v 3.0a v 3.0c v 2.1a v 2.1a v 2.1a v 1.71.5 v 1.69
X11SRi-iF v 1.2b Not Affected v 1.2b v 1.2a v 1.2a v 1.2 v 1.2 v 1.2 v 1.71.5 Pending
X11SRL-F v 1.2b Not Affected v 1.2b v 1.2a v 1.2a v 1.2 v 1.2 v 1.2 v 1.71.5 Pending
X11SRM-F v 1.2b Not Affected v 1.2b v 1.2a v 1.2a v 1.2 v 1.2 v 1.2 v 1.71.5 Pending
X11SRM-VF v 1.2b Not Affected v 1.2b v 1.2a v 1.2a v 1.2 v 1.2 v 1.2 v 1.71.5 Pending
X11SSL-F v 2.2a Not Affected v 2.2a Not Affected Not Affected v2.2 v2.2 v2.2 v 1.71.5 v 1.54
X11SSM-F v 2.2a Not Affected v 2.2a Not Affected Not Affected v2.2 v2.2 v2.2 v 1.71.5 v 1.54
X11SSL v 2.2a Not Affected v 2.2a Not Affected Not Affected v2.2 v2.2 v2.2 v 1.71.5 v 1.54
X11SSM v 2.2a Not Affected v 2.2a Not Affected Not Affected v2.2 v2.2 v2.2 v 1.71.5 v 1.54
X11SSH-F v 2.2a Not Affected v 2.2a Not Affected Not Affected v2.2 v2.2 v2.2 v 1.71.5 v 1.54
X11SSH-LN4F v 2.2a Not Affected v 2.2a Not Affected Not Affected v2.2 v2.2 v2.2 v 1.71.5 v 1.54
X11SSW-4TF v 2.2a Not Affected v 2.2a Not Affected Not Affected v2.2 v2.2 v2.2 v 1.71.5 v 1.54
X11SSW-TF v 2.2a Not Affected v 2.2a Not Affected Not Affected v2.2 v2.2 v2.2 v 1.71.5 v 1.54
X11SSW-F v 2.2a Not Affected v 2.2a Not Affected Not Affected v2.2 v2.2 v2.2 v 1.71.5 v 3.81
X11SSi-LN4F v 2.2a Not Affected v 2.2a Not Affected Not Affected v2.2 v2.2 v2.2 v 1.71.5 v 1.54
X11SSW-F v 2.2a Not Affected v 2.2a Not Affected Not Affected v2.2 v2.2 v2.2 v 1.71.5 v 3.81
X11SSH-TF v 2.2a Not Affected v 2.2a Not Affected Not Affected v2.2 v2.2 v2.2 v 1.71.5 v 1.54
X11SSH-CTF v 2.2a Not Affected v 2.2a Not Affected Not Affected v2.2 v2.2 v2.2 v 1.71.5 v 1.54
X11SSL-CF v 2.2a Not Affected v 2.2a Not Affected Not Affected v2.2 v2.2 v2.2 v 1.71.5 v 1.54
X11SSL-nF v 2.2a Not Affected v 2.2a Not Affected Not Affected v2.2 v2.2 v2.2 v 1.71.5 v 1.54
X11SSH-GF-1585 v 1.2b Not Affected v 1.2b Not Affected Not Affected v1.2 v1.2 v1.2 v 1.71.5 v 1.54
X11SSH-GF-1585L v 1.2b Not Affected v 1.2b Not Affected Not Affected v1.2 v1.2 v1.2 v 1.71.5 v 1.54
X11SSH-GTF-1585 v 1.2b Not Affected v 1.2b Not Affected Not Affected v1.2 v1.2 v1.2 v 1.71.5 v 1.54
X11SSH-GTF-1585L v 1.2b Not Affected v 1.2b Not Affected Not Affected v1.2 v1.2 v1.2 v 1.71.5 v 1.54
X11SSH-GTF-1585L v 1.2b Not Affected v 1.2b Not Affected Not Affected v1.2 v1.2 v1.2 v 1.71.5 v 1.54

  SuperBlade, MicroBlade and MicroCloud Systems (top)

Intel QSR 2019.1 Intel QSR 2018.4 Spectre Meltdown BMC Virtual Media CVE-2019-6260
Intel Advisory Intel-SA-00213 Intel-SA-00223 Intel-SA-00233 Intel-SA-00185 Intel-SA-00191 Intel-SA-00088 Intel-SA-00115 Intel-SA-00161
Motherboard BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BMC Version BMC Version
B11DPT v 3.1 Not Affected v 3.1 v 3.0a v 3.0a v 2.0b v 2.0b v 2.0b v 3.68 Pending
B11DPE v 3.1 Not Affected v 3.1 v 3.0a v 3.0a v 2.0c v 2.0c v 2.0c v 3.68 Pending
B11SPE-CPU-TF Pending Not Affected Pending Pending Pending v 2.0c v 2.1 v 2.1 v 3.68 Pending
B11SPE-CPU-25G Pending Not Affected Pending Pending Pending v 2.0c v 2.1 v 2.0c v 3.68 Pending
B11QPI Pending Not Affected Pending v 3.0 v 3.0 v 2.0b v 2.0b v 2.0b v 3.68 Pending
X11SSD-F v 2.2a Not Affected v 2.2a Not Affected Not Affected v 2.1a v 2.2 v 2.2 v 3.68 Pending
X11SSE-F v 2.2a Not Affected v 2.2a Not Affected Not Affected v 2.1a v 2.2 v 2.2 v 3.68 v 1.54
B2SS1-CPU Pending Not Affected Pending Not Affected Not Affected v 2.1a v 2.2 v 2.2 v 3.68 not applicable
B2SS1-CF Pending Not Affected Pending Not Affected Not Affected v 2.1a v 2.2 v 2.2 v 3.68 not applicable
B2SS1-F Pending Not Affected Pending Not Affected Not Affected v 2.1a v 2.2 v 2.2 v 3.68 not applicable
B2SS2-F Pending Not Affected Pending Not Affected Not Affected v 2.1a v 2.2 v 2.2 v 3.68 not applicable
B2SS1-MTF Pending Not Affected Pending Not Affected Not Affected v 1.1 v 1.2 v 1.2 v 3.68 not applicable
B2SS1-H-MTF Pending Not Affected Pending Not Affected Not Affected v 1.1 v 1.2 v 1.2 v 3.68 not applicable
B2SS2-MTF Pending Not Affected Pending Not Affected Not Affected v 1.1 v 1.2 v 1.2 v 3.68 not applicable
B2SS2-H-MTF Pending Not Affected Pending Not Affected Not Affected v 1.1 v 1.2 v 1.2 v 3.68 not applicable
X11SCD-F v 1.0 Not Affected v 1.0b v 3.68 v 3.73
X11SDD-8C-F v 1.0a Not Affected v 1.0a v 3.68 v 3.68
X11SDD-18C-F v 1.0a Not Affected v 1.0a v 3.68 v 3.68

  Multi-Processor X11 Motherboards (top)

Intel QSR 2019.1 Intel QSR 2018.4 Spectre Meltdown BMC Virtual Media CVE-2019-6260
Intel Advisory Intel-SA-00213 Intel-SA-00223 Intel-SA-00233 Intel-SA-00185 Intel-SA-00191 Intel-SA-00088 Intel-SA-00115 Intel-SA-00161
Motherboard BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BMC Version BMC Version
X11QPH+ v 3.1 Not Affected v 3.1 v 3.0a v 3.0a v 2.1 v 2.1 v 2.1 v 1.71.5 v 1.70
X11OPi-CPU v 3.1 Not Affected v 3.1 v 3.0a v 3.0a v 2.1 v 2.1 v 2.1 v 1.71.5 Pending

  Embedded, Workstation and Desktop Systems (top)

    • – All systems based on the following processors need to be updated

 

    • – 6th, 7th & 8th Generation Intel® Core™ Processor Family

 

    • – Intel® Xeon® Processor W Family

 

    • – Intel® Atom® C3000 Processor Family

 

    • – Apollo Lake Intel® Atom Processor E3900 series

 

    • – Apollo Lake Intel® Pentium™

 

Intel QSR 2019.1 Intel QSR 2018.4 Spectre Meltdown BMC Virtual Media CVE-2019-6260
Intel Advisory Intel-SA-00213 Intel-SA-00223 Intel-SA-00233 Intel-SA-00185 Intel-SA-00191 Intel-SA-00088 Intel-SA-00115 Intel-SA-00161
Motherboard BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BMC Version BMC Version
X11SAE Pending Not Affected Pending Pending Not Affected v 2.3 v 2.3 v 2.3 Not Applicable Not Applicable
X11SAE-F Pending Not Affected Pending Pending Not Affected v 2.3 v 2.3 v 2.3 Pending 1.54
X11SAE-M Pending Not Affected Pending Pending Not Affected v 2.3 v 2.3 v 2.3 Not Applicable Not Applicable
X11SAT Pending Not Affected Pending v 2.3a Not Affected v 2.3 v 2.3 v 2.3 Not Applicable Not Applicable
X11SAT-F Pending Not Affected Pending v 2.3a Not Affected v 2.3 v 2.3 v 2.3 Pending v 1.54
X11SCZ-F Pending Not Affected Pending v 1.0b v 1.0b v 1.0a v 1.0a v 1.0a Pending v 1.23
X11SCZ-Q Pending Not Affected Pending v 1.0b v 1.0b v 1.0 v 1.0 v 1.0 Not Applicable Not Applicable
X11SCQ v 1.0c Not Affected v 1.0c v 1.0b v 1.0b v 1.0a v 1.0a v 1.0a Not Applicable Not Applicable
X11SCQ-L v 1.0c Not Affected v 1.0c v 1.0b v 1.0b v 1.0a v 1.0a v 1.0a Not Applicable Not Applicable
X11SCV-L v 1.0c Not Affected v 1.0c v 1.0a v 1.0a v 1.0 v 1.0 v 1.0 Not Applicable Not Applicable
X11SCV-Q v 1.0c Not Affected v 1.0c v 1.0a v 1.0a v 1.0 v 1.0 v 1.0 Not Applicable Not Applicable
X11SRA Pending Not Affected Pending v 1.2a v 1.2a v 1.2 v 1.2 v 1.2 Not Applicable Not Applicable
X11SRA-F Pending Not Affected Pending v 1.2a v 1.2a v 1.2 v 1.2 v 1.2 Pending Pending
X11SRA-RF Pending Not Affected Pending Pending Pending v 1.2 v 1.2 v 1.2 Pending Pending
X11SSV-Q v 3.0 Not Affected v 3.0 v 2.3b Pending v 2.2b v 2.3 v 2.3a Pending Not Applicable
X11SSV-LVDS v 3.0 Not Affected v 3.0 v 2.3b Pending v 2.2b v 2.3 v 2.3a Pending Not Applicable
X11SSN-E v 1.2 Not Affected v 1.2 Pending Pending v 1.1b v 1.1b v 1.1b Pending Not Applicable
X11SSN-E-VDC v 1.2 Not Affected v 1.2 Pending Pending v 1.0c v 1.1 v 1.1b Pending Not Applicable
X11SSN-E-WOHS v 1.2 Not Affected v 1.2 Pending Pending v 1.0c v 1.1 v 1.1b Pending Not Applicable
X11SSN-H v 1.2 Not Affected v 1.2 v 1.2 v 1.2 v 1.0c v 1.1 v 1.1b Pending Not Applicable
X11SSN-H-VDC v 1.2 Not Affected v 1.2 v 1.2 v 1.2 v 1.0c v 1.1 v 1.1b Pending Not Applicable
X11SSN-H-WOHS v 1.2 Not Affected v 1.2 Pending Pending v 1.0c v 1.1 v 1.1b Pending Not Applicable
X11SSN-L v 1.2 Not Affected v 1.2 v 1.2 v 1.2 v 1.0c v 1.1 v 1.1b Pending Not Applicable
X11SSN-L-VDC v 1.2 Not Affected v 1.2 Pending Pending v 1.0c v 1.1 v 1.1b Pending Not Applicable
X11SSN-L-WOHS v 1.2 Not Affected v 1.2 Pending Pending v 1.0c v 1.1 v 1.1b Pending Not Applicable
A2SAN-E v 1.2b Not Affected v 1.2b Pending Not Affected v 1.0c v 1.2 v 1.2 Pending Not Applicable
A2SAN-H v 1.2b Not Affected v 1.2b v 1.2b Not Affected v 1.0c v 1.2 v 1.2 Pending Not Applicable
A2SAN-L v 1.2b Not Affected v 1.2b pending Not Affected v 1.0c v 1.2 v 1.2 Pending Not Applicable
A2SAN-H-WOHS v 1.2b Not Affected v 1.2b v 1.2b Not Affected Not Affected Not Affected Not Affected Pending Not Applicable
X11SAN v 1.2b Not Affected v 1.2b v 1.2b Not Affected v 1.0c v 1.2 v 1.2 Pending Not Applicable
X11SAN-WOHS v 1.2b Not Affected v 1.2b pending Not Affected v 1.0c v 1.2 v 1.2 Pending Not Applicable
A2SAP-E v 1.2b Not Affected v 1.2b pending Not Affected v 1.0c v 1.2 v 1.2a Pending Not Applicable
A2SAP-H v 1.2b Not Affected v 1.2b pending Not Affected v 1.0c v 1.2 v 1.2a Pending Not Applicable
A2SAP-L v 1.2b Not Affected v 1.2b pending Not Affected v 1.0c v 1.2 v 1.2a Pending Not Applicable
A2SDi-2C-HLN4F Not Affected Not Affected Pending Not Affected Not Affected v 1.0b v 1.1 v 1.1 Pending v 3.80
A2SDi-4C-HLN4F Not Affected Not Affected Pending Not Affected Not Affected v 1.0b v 1.1 v 1.1 Pending v 3.80
A2SDi-8C-HLN4F Not Affected Not Affected Pending Not Affected Not Affected v 1.0b v 1.1 v 1.1 Pending v 3.80
A2SDi-8C+-HLN4F Not Affected Not Affected Pending Not Affected Not Affected v 1.0b v 1.1 v 1.1 Pending v 3.80
A2SDi-12C-HLN4F Not Affected Not Affected Pending Not Affected Not Affected v 1.0b v 1.1 v 1.1 Pending v 3.80
A2SDi-16C-HLN4F Not Affected Not Affected Pending Not Affected Not Affected v 1.0b v 1.1 v 1.1 Pending v 3.80
A2SDi-H-TF Not Affected Not Affected v 1.1c Not Affected Not Affected v 1.0b v 1.1 v 1.1 Pending Pending
A2SDi-H-TP4F Not Affected Not Affected v 1.1c Not Affected Not Affected v 1.0b v 1.1 v 1.1 Pending Pending
A2SDi-LN4F Not Affected Not Affected v 1.1c Not Affected Not Affected v 1.0b v 1.1 v 1.1 Pending Pending
A2SDi-TP8F Not Affected Not Affected v 1.1c Not Affected Not Affected v 1.0b v 1.1 v 1.1 Pending Pending
A2SD1-3750F Not Affected Not Affected Pending Not Affected Not Affected v 1.0 v 1.0 v 1.0 Pending Pending
A2SD1-3955F Not Affected Not Affected Pending Not Affected Not Affected v 1.0 v 1.0 v 1.0 Pending Pending
A2SDV-4C-LN10PF Not Affected Not Affected v 1.1c Not Affected Not Affected v1.1 v1.1 v1.1 Pending Pending
A2SDV-4C-LN8F Not Affected Not Affected v 1.1c Not Affected Not Affected v1.1 v1.1 v1.1 Pending Pending
A2SDV-8C-LN10PF Not Affected Not Affected v 1.1c Not Affected Not Affected v1.1 v1.1 v1.1 Pending Pending
A2SDV-8C-LN8F Not Affected Not Affected v 1.1c Not Affected Not Affected v1.1 v1.1 v1.1 Pending Pending
A2SDV-8C-TLN5F Not Affected Not Affected Pending Not Affected Not Affected v 1.0b v 1.1 v 1.1 Pending Pending
A2SDV-16C-TLN5F Not Affected Not Affected Pending Not Affected Not Affected v 1.0b v 1.1 v 1.1 Pending Pending
A2SDV-12C+-TLN5F Not Affected Not Affected Pending Not Affected Not Affected v 1.0b v 1.1 v 1.1 Pending Pending
X11SDV-4C-TLN2F Pending Not Affected Pending Not Affected v 1.1 v 1.0a v 1.0a v 1.0b Pending v 1.25
X11SDV-8C-TLN2F Pending Not Affected Pending Not Affected v 1.1 v 1.0a v 1.0a v 1.0b Pending v 1.25
X11SDV-12C-TLN2F Pending Not Affected Pending Not Affected v 1.1 v 1.0a v 1.0a v 1.0b Pending v 1.25
X11SDV-16C-TLN2F Pending Not Affected Pending Not Affected v 1.1 v 1.0a v 1.0a v 1.0b Pending v 1.25
X11SDV-8C+-TLN2F Pending Not Affected Pending Not Affected v 1.1 v 1.0a v 1.0a v 1.0b Pending v 1.25
X11SDV-16C+-TLN2F Pending Not Affected Pending Not Affected v 1.1 v 1.0a v 1.0a v 1.0b Pending v 1.25
X11SDV-4C-TP8F v 1.1a Not Affected v 1.1a Not Affected v 1.1 v 1.0a v 1.0a v 1.0c Pending v 1.25
X11SDV-8C-TP8F v 1.1a Not Affected v 1.1a Not Affected v 1.1 v 1.0a v 1.0a v 1.0c Pending v 1.25
X11SDV-12C-TP8F v 1.1a Not Affected v 1.1a Not Affected v 1.1 v 1.0a v 1.0a v 1.0c Pending v 1.25
X11SDV-16C-TP8F v 1.1a Not Affected v 1.1a Not Affected v 1.1 v 1.0a v 1.0a v 1.0c Pending v 1.25
X11SDW-4C-TP13F v 1.1a Not Affected v 1.1a Not Affected v 1.0 latest BIOS release latest BIOS release latest BIOS release Pending v 3.68
X11SDW-8C-TP13F v 1.1a Not Affected v 1.1a Not Affected v 1.0 latest BIOS release latest BIOS release latest BIOS release Pending v 3.68
X11SDW-12C-TP13F v 1.1a Not Affected v 1.1a Not Affected Pending latest BIOS release latest BIOS release latest BIOS release Pending v 3.68
X11SDW-14C-TP13F v 1.1a Not Affected v 1.1a Not Affected Pending latest BIOS release latest BIOS release latest BIOS release Pending v 3.68
X11SDW-14CNT v 1.1a Not Affected v 1.1a Not Affected Pending latest BIOS release latest BIOS release latest BIOS release Pending v 3.68
X11SDW-16C-TP13F v 1.1a Not Affected v 1.1a Not Affected v 1.0 latest BIOS release latest BIOS release latest BIOS release Pending v 3.68
X11SSZ-QF Pending Not Affected Pending v 2.3b Pending v2.2b v2.3 v2.3a Pending v 1.52
X11SSZ-F Pending Not Affected Pending v 2.3b Pending v2.2b v2.3 v2.3a Pending v 1.52
X11SSZ-TLN4F Pending Not Affected Pending v 2.3b Pending v2.2b v2.3 v2.3a Pending v 1.52
X11SSQ v 3.0 Not Affected v 3.0 Pending Pending v2.2b v2.3 v2.3 Pending Not Applicable
X11SSQ-L v 3.0 Not Affected v 3.0 Pending Pending v2.2b v2.3 v2.3 Pending Not Applicable
X11SSV-M4 Pending Not Affected Pending Pending Pending v 1.1 v 1.1 v 1.1 Pending Not Applicable
X11SSV-M4F Pending Not Affected Pending Not Affected Pending v 1.1 v 1.1 v 1.1 Pending Not Applicable
A2SAV v 1.2b Not Affected v 1.2b v 1.2b Not Affected v 1.0c v 1.2 v 1.2a Pending Not Applicable
A2SAV-L v 1.2b Not Affected v 1.2b v 1.2b Not Affected v 1.0c v 1.2 v 1.2a Pending Not Applicable
X11SSA-F Pending Not Affected Pending Not Affected Not Affected v 2.1a v 2.1a v 2.1a Pending v 1.48
X11SAA v 1.2b Not Affected v 1.2b v 1.2b Not Affected v 1.0c v 1.2 v 1.2a Pending Not Applicable
X11SBA-F Not Affected Not Affected Pending Not Affected Not Affected v 1.1a Not Affected Not Affected Pending v 1.53
X11SBA-LN4F Not Affected Not Affected Pending Not Affected Not Affected v 1.1a Not Affected Not Affected Pending v 1.53
C9X299-PG300 Pending Not Affected Pending v 1.2a v 1.2a v1.2 v1.2 v1.2 Pending Not Applicable
c9X299-PG300F Pending Not Affected Pending v 1.2a v 1.2a Not Affected Not Affected Not Affected Pending v 1.30
C9X299-PGF Pending Not Affected Pending v 1.2a v 1.2a v 1.2 v 1.2 v 1.2 Pending v 1.25
C9X299-RPGF Pending Not Affected Pending Pending Pending v 1.2 v 1.2 v 1.2 Pending v 1.25
C7X99-OCE Pending Not Affected Pending Not Affected Not Affected v 2.1a v 2.1a v 2.1a Pending Not Applicable
C7X99-OCE-F Pending Not Affected Pending Not Affected Not Affected v 2.1a v 2.1a v 2.1a Pending v 2.23
C7Z370-CG-IW Pending Not Affected Pending v 1.2b Not Affected v 1.2a v 1.2a v 1.2a Pending Not Applicable
C7Z370-CG-L Pending Not Affected Pending v 1.2b Not Affected v 1.2a v 1.2a v 1.2a Pending Not Applicable
C7Z270-PG Pending Not Affected Pending Pending Not Affected v 1.3 v 1.3 v 1.3 Pending Not Applicable
C7Z270-CG Pending Not Affected Pending Pending Not Affected v 1.3 v 1.3 v 1.3 Pending Not Applicable
C7Z270-CG-L Pending Not Affected Pending Pending Not Affected v 1.3 v 1.3 v 1.3 Pending Not Applicable
C7B250-CB-ML Pending Not Affected Pending Pending Not Affected v 1.3 v 1.3 v 1.3 Pending Not Applicable
C7B250-CB-MK Pending Not Affected Pending Pending Not Affected v 1.2a v 1.2a v 1.2a Pending Not Applicable
C7B360-CB-M Pending Not Affected Pending Pending Pending v 1.0a v 1.0a v 1.0a Pending Not Applicable
C7B360_CB-MW Pending Not Affected Pending Pending Pending v 1.0a v 1.0a v 1.0a Pending Not Applicable
C7Z270-CG-M Pending Not Affected Pending Pending Not Affected v 1.2a v 1.2a v 1.2a Pending Not Applicable
C7H270-CG-ML Pending Not Affected Pending Pending Not Affected v 1.3 v 1.3 v 1.3 Pending Not Applicable
C7Q270-CB-ML Pending Not Affected Pending Pending Not Affected v 1.3 v 1.3 v 1.3 Pending Not Applicable
C7Z170-OCE Pending Not Affected Pending v 2.2 Not Affected v 2.1a v 2.1a v 2.1a Pending Not Applicable
C7Z170-SQ Pending Not Affected Pending v 2.2 Pending v 2.1a v 2.1a v 2.1a Pending Not Applicable
C7Z170-M Pending Not Affected Pending v 2.2 Pending v 2.1a v 2.1a v 2.1a Pending Not Applicable
C7H170-M Pending Not Affected Pending v 2.2 Pending v 2.1a v 2.1a v 2.1a Pending Not Applicable
C9Z390-CG Pending Not Affected Pending Pending Pending Not Affected Not Affected Not Affected Pending Not Applicable
C9Z390-CG-IW Pending Not Affected Pending Pending Pending Not Affected Not Affected N
ot Affected Pending Not Applicable
C9Z390-CGW Pending Not Affected Pending Pending Pending Not Affected Not Affected Not Affected Pending Not Applicable
C9Z390-PGW V 1.0c Not Affected v 1.0c v 1.0c v 1.0c Not Affected Not Affected Not Affected Pending Not Applicable
Date last modified:

The following X10 generation Supermicro Motherboards are impacted by this issue.
Additional systems will be added to this list as information becomes available.

System Listings:   |  X10 DP |  X10 UP |  X10 MP |  X10 Embedded/Workstation/Desktop |  X10 SuperBlade/MicroBlade/MicroCloud |

  Dual Processor (2S) X10 Systems

Intel QSR 2019.1 Intel QSR 2018.4 Spectre Meltdown BMC Virtual Media CVE-2019-6260
Intel Advisory Intel-SA-00213 Intel-SA-00223 Intel-SA-00233 Intel-SA-00185 Intel-SA-00191 Intel-SA-00088 Intel-SA-00115 / Intel-SA-00161
Motherboard BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BMC Version BMC Version
X10DAi v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 N/A N/A
X10DAC Pending Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 N/A N/A
X10DAL-i v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 N/A N/A
X10DAX Pending Not Affected Pending Not Affected Not Affected v 3.0a v 3.0a N/A N/A
X10DDW-i v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.0a v 3.0a v 3.83 v 3.80
X10DDW-iN v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.0a v 3.0a v 3.83 v 3.80
X10DRS v 3.1a Not Affected v 3.1a Not Affected Not Affected v 3.0a v 3.0a v 3.83 N/A
X10DRD-i v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.83
X10DRD-iT v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.0a v 3.0a v 3.83 Pending
X10DRD-iNT v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DRD-iNTP v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DRD-iTP v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DRD-L v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DRD-LT v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DRD-LTP v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DRX v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DRH-C v 3.1a Not Affected v 3.1a Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.81
X10DRH-CT v 3.1a Not Affected v 3.1a Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.81
X10DRH-CLN4 v 3.1a Not Affected v 3.1a Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DRH-i v 3.1a Not Affected v 3.1a Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.81
X10DRH-iT v 3.1a Not Affected v 3.1a Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.81
X10DRH-iLN4 v 3.1a Not Affected v 3.1a Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DRi v 3.1a Not Affected v 3.1a Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRi-T v 3.1a Not Affected v 3.1a Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRC-LN4+ v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRC-T4+ v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRi-LN4+ v 3.1c Not Affected v 3.1c Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRi-T4+ v 3.1a Not Affected v 3.1a Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRL-LN4 v 3.1c Not Affected v 3.1c Not Affected Not Affected v 3.0a v 3.0a v 3.83 v 3.80
X10DRL-i v 3.1c Not Affected v 3.1c Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRL-iT v 3.1c Not Affected v 3.1c Not Affected Not Affected v 3.0b v 3.0b v 3.83 v 3.80
X10DRL-C v 3.1c Not Affected v 3.1c Not Affected Not Affected v 3.0b v 3.0b v 3.83 v 3.80
X10DRL-CT v 3.1c Not Affected v 3.1c Not Affected Not Affected v 3.0b v 3.0b v 3.83 v 3.80
X10DRT-L v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DRT-LIBQ v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DRT-LIBF v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DRT-B+ v 3.1a Not Affected v 3.1a Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.84
X10DRT-H v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.84
X10DRT-HIBF v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.84
X10DRT-PS v 3.1a Not Affected v 3.1a Not Affected Not Affected v 3.1a v 3.1a v 3.83 v 3.80
X10DRT-P v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRT-PT v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRT-PIBQ v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRT-PIBF v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRFR-N v 3.1b Not Affected v 3.1b Not Affected Not Affected v 3.1b v 3.1b v 3.83 v 3.80
X10DRFR-NT v 3.1b Not Affected v 3.1b Not Affected Not Affected v 3.1b v 3.1b v 3.83 v 3.80
X10DRFR v 3.1b Not Affected v 3.1b Not Affected Not Affected v 3.1b v 3.1b v 3.83 v 3.80
X10DRFR-T v 3.1b Not Affected v 3.1b Not Affected Not Affected v 3.0a v 3.0a v 3.83 v 3.80
X10DRFF-CG v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRFF-CTG v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRFF-iG v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRFF-iTG v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRFF v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRFF-C v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRW-N v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DRW-NT v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DRW-E v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DRW-ET v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.0a v 3.0a v 3.83 Pending
X10DRW-i v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRW-iT v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DSN-TS Pending Not Affected Pending Not Affected Not Affected v 3.0a v 3.0a v 3.83 Pending
X10DRG-OT+-CPU v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DRG-O+-CPU v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DGO-T v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DGQ v 3.1a Not Affected v 3.1a Not Affected Not Affected v 3.0a v 3.0a v 3.83 v 3.80
X10DRG-Q v 3,1 Not Affected v 3,1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10DRG-H v 3.1a Not Affected v 3.1a Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRG-HT v 3.1a Not Affected v 3.1a Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10DRU-i+ v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.81
X10DRU-X v 3.1a Not Affected v 3.1a Not Affected Not Affected v 3.1a v 3.1a v 3.83 Pending
X10DRU-XLL v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.0a v 3.0a v 3.83 Pending
X10DSC+ v 3.1 Not Affected v 3.1 Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80

  Single Processor (1P) X10 Systems (top)

Intel QSR 2019.1 Intel QSR 2018.4 Spectre Meltdown BMC Virtual Media CVE-2019-6260
Intel Advisory Intel-SA-00213 Intel-SA-00223 Intel-SA-00233 Intel-SA-00185 Intel-SA-00191 Intel-SA-00088 Intel-SA-00115 / Intel-SA-00161
Motherboard BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BMC Version BMC Version
X10SRA-F Pending Not Affected Pending Not Affected Not Affected v 2.1a v 2.1a v 3.83 v 3.80
X10SRA Pending Not Affected Pending Not Affected Not Affected v 2.1a v 2.1a v 3.83 not applicable
X10SRD-F Pending Not Affected Pending Not Affected Not Affected v 3.0a v 3.1 v 3.83 v 3.80
X10SRM-F v 3.1c Not Affected v 3.1c Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10SRM-TF v 3.1c Not Affected v 3.1c Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10SRL-F Pending Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10SRi-F Pending Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10SRH-CF v 3.1c Not Affected v 3.1c Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10SRH-CLN4F v 3.1c Not Affected v 3.1c Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10SRG-F v 3.1c Not Affected v 3.1c Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10SRL-F Pending Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10SRW-F v 3.1c Not Affected v 3.1c Not Affected Not Affected v 3.1 v 3.1 v 3.83 v 3.80
X10SAE Pending Not Affected Pending Not Affected Not Affected v 3.2 v 3.2 v 3.83 Not applicable
X10SAT Pending Not Affected Pending Not Affected Not Affected v 3.2 v 3.2 v 3.83 EOL
X10SLX-F Pending Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 v 3.83 Pending
X10SLD-F Not Affected Not Affected Pending Not Affected Not Affected v 3.1 v 3.2 v 3.83 v 3.81
X10SLD-HF Not Affected Not Affected Pending Not Affected Not Affected v 3.1 v 3.2 v 3.83 v 3.81
X10SLE-F Not Affected Not Affected Pending Not Affected Not Affected v 3.1 v 3.2 v 3.83 v 3.81
X10SLE-HF Not Affected Not Affected Pending Not Affected Not Affected v 3.1 v 3.2 v 3.83 v 3.81
X10SLE-DF Not Affected Not Affected Pending Not Affected Not Affected v 3.1 v 3.2 v 3.83 Pending
X10SL7-F Pending Not Affected Pending Not Affected Not Affected v 3.2 v 3.2 v 3.83 Pending
X10SLA-F Pending Not Affected Pending Not Affected Not Affected v 3.2 v 3.2 v 3.83 Pending
X10SLH-F v 3.2a Not Affected v 3.2a Not Affected Not Affected v 3.2 v 3.2 v 3.83 v 3.81
X10SLL+-F Pending Not Affected Pending Not Affected Not Affected v 3.2 v 3.2 v 3.83 Pending
X10SLL-F Pending Not Affected Pending Not Affected Not Affected v 3.2 v 3.2 v 3.83 v 3.80
X10SLL-SF Pending Not Affected Pending Not Affected Not Affected v 3.2 v 3.2 v 3.83 v 3.80
X10SLL-S Pending Not Affected Pending Not Affected Not Affected v 3.2 v 3.2 v 3.83 v 3.80
X10SLM-F v 3.2a Not Affected v 3.2a Not Affected Not Affected v 3.2 v 3.2 v 3.83 v 3.80
X10SLM+-F v 3.2a Not Affected v 3.2a Not Affected Not Affected v 3.2 v 3.2 v 3.83 v 3.81
X10SLM+-LN4F v 3.2a Not Affected v 3.2a Not Affected Not Affected v 3.2 v 3.2 v 3.83 v 3.81

  SuperBlade, MicroBlade and MicroCloud Systems (top)

Intel QSR 2019.1 Intel QSR 2018.4 Spectre Meltdown BMC Virtual Media CVE-2019-6260
Intel Advisory Intel-SA-00213 Intel-SA-00223 Intel-SA-00233 Intel-SA-00185 Intel-SA-00191 Intel-SA-00088 Intel-SA-00115 / Intel-SA-00161
Motherboard BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BMC Version BMC Version
X10SDE-DF Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.68 Pending
X10SDD-16C-F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.68 Pending
X10SDD-F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.68 Pending
B1SD1-16C-TF Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.68 Not Applicable
B1SD1-TF Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.68 Not Applicable
B1SD2-16C-TF Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.68 Not Applicable
B1SD2-TF Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.68 Not Applicable
B10DRC Pending Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 v 3.68 Not Applicable
B10DRC-N Pending Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 v 3.68 Not Applicable
B10DRI Pending Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 v 3.68 Not Applicable
B10DRI-N Pending Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 v 3.68 Not Applicable
B10DRG-IBF Pending Not Affected Pending Not Affected Not Affected v 3.0a v 3.0a v 3.68 Not Applicable
B10DRG-IBF2 Pending Not Affected Pending Not Affected Not Affected v 3.0a v 3.0a v 3.68 Not Applicable
B10DRG-TP Pending Not Affected Pending Not Affected Not Affected v 3.0a v 3.0a v 3.68 Not Applicable
B10DRT Pending Not Affected Pending Not Affected Not Affected v 3.0a v 3.0a v 3.68 Not Applicable
B10DRT-IBF Pending Not Affected Pending Not Affected Not Affected v 3.0a v 3.0a v 3.68 Not Applicable
B10DRT-IBF2 Pending Not Affected Pending Not Affected Not Affected v 3.0a v 3.0a v 3.68 Not Applicable
B10DRT-TP Pending Not Affected Pending Not Affected Not Affected v 3.0a v 3.0a v 3.68 Not Applicable

  Multi-Processor X10 Motherboards (top)

Intel QSR 2019.1 Intel QSR 2018.4 Spectre Meltdown BMC Virtual Media CVE-2019-6260
Intel Advisory Intel-SA-00213 Intel-SA-00223 Intel-SA-00233 Intel-SA-00185 Intel-SA-00191 Intel-SA-00088 Intel-SA-00115 / Intel-SA-00161
Motherboard BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BMC Version BMC Version
X10QRH+ v 3.1c Not Affected v 3.1c Not Affected Not Affected v 3.1 v 3.1 v 3.80 v 3.83
X10QBL-4 Pending Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 v 3.80 v 3.83
X10QBL-4CT Pending Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 v 3.80 v 3.83
X10QBL Pending Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 v 3.80 v 3.83
X10QBL-CT Pending Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 v 3.80 v 3.83
X10QBi Pending Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 v 3.81 v 3.83
X10OBI-CPU Pending Not Affected Pending Not Affected Not Affected v 3.0b v 3.0b v 3.83 Not Applicable
X10DBT-T Pending Not Affected Pending Not Affected Not Affected EOL EOL v 3.83 Pending

  Embedded, Workstation and Desktop Systems (top)

Intel QSR 2019.1 Intel QSR 2018.4 Spectre Meltdown BMC Virtual Media CVE-2019-6260
Intel Advisory Intel-SA-00213 Intel-SA-00223 Intel-SA-00233 Intel-SA-00185 Intel-SA-00191 Intel-SA-00088 Intel-SA-00115 / Intel-SA-00161
Motherboard BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BMC Version BMC Version
X10SDV-7TP8F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-7TP4F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-2C-7TP4F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-4C-7TP4F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-2C-TP4F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-4C+-TP4F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-2C-TP8F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-TP8F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-TLN4F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-8C-TLN4F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-6C-TLN4F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-2C-TLN2F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-4C-TLN2F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-4C-TLN4F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-4C+-TLN4F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-6C+-TLN4F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-8C-TLN4F+ Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-8C+-LN2F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-12C-TLN4F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-12C-TLN4F+ Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-12C+-TLN4F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-16C+-TLN4F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-16C-TLN4F+ Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SDV-16C-TLN4F Not Affected Not Affected v 2.0c Not Affected Not Affected v 1.3 v 2.0 v 3.83 v 3.83
X10SLQ Not Affected Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 Not Applicable Not Applicable
X10SLQ-L Not Affected Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 Not Applicable Not Applicable
X10SLV Not Affected Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 Not Applicable Not Applicable
X10SLV-Q Not Affected Not Affected Pending Not Affected Not Affected v 3.1 v 3.1 Not Applicable Not Applicable
X10SBA Not Affected Not Affected Pending Not Affected Not Affected v 1.3a Not Affected Not Applicable Not Applicable
X10SBA-L Not Affected Not Affected Pending Not Affected Not Affected v 1.3a Not Affected Not Applicable Not Applicable
A1SRM-LN7F-2358 Not Affected Not Affected Pending Not Affected Not Affected v 2.1 Not Affected v 3.83 Pending
A1SRM-LN7F-2758 Not Affected Not Affected Pending Not Affected Not Affected v 2.1 Not Affected v 3.83 Pending
A1SRM-LN5F-2358 Not Affected Not Affected Pending Not Affected Not Affected v 2.1 Not Affected v 3.83 Pending
A1SA2-2750F Not Affected Not Affected Pending Not Affected Not Affected v2.1 Not Affected v 3.83 Pending
A1SAM-2750F Not Affected Not Affected Pending Not Affected Not Affected v2.1 Not Affected v 3.83 Pending
A1SAM-2550F Not Affected Not Affected Pending Not Affected Not Affected v2.1 Not Affected v 3.83 Pending
A1SRM-2758F Not Affected Not Affected Pending Not Affected Not Affected v2.1 Not Affected v 3.83 Pending
A1SRM-2558F Not Affected Not Affected Pending Not Affected Not Affected v2.1 Not Affected v 3.83 Pending
A1SAI-2750F Not Affected Not Affected Pending Not Affected Not Affected v2.1 Not Affected v 3.83 v 3.72
A1SAI-2550F Not Affected Not Affected Pending Not Affected Not Affected v2.1 Not Affected v 3.83 v 3.72
A1SRi-2758F Not Affected Not Affected Pending Not Affected Not Affected v2.1 Not Affected v 3.83 v 3.72
A1SRi-2558F Not Affected Not Affected Pending Not Affected Not Affected v2.1 Not Affected v 3.83 v 3.72
A1SRi-2358F Not Affected Not Affected Pending Not Affected Not Affected v2.1 Not Affected v 3.83 v 3.72

The following X9 generation Supermicro Motherboards are impacted by this issue.
Additional systems will be added to this list as information becomes available.

System Listings:   |  X9 DP |  X9 UP |  X9 MP |  X9 SuperBlade |

  Dual Processor (2S) X9 Systems

Intel QSR 2019.1 Intel QSR 2018.4 Spectre Meltdown BMC Virtual Media
Intel Advisory Intel-SA-00213 Intel-SA-00223 Intel-SA-00233 Intel-SA-00185 Intel-SA-00191 Intel-SA-00088 Intel-SA-00115 / Intel-SA-00161
Motherboard BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BMC Version
X9DRG-H(T)F Special Order Not Affected Special Order Not Affected Not Affected v3.3 v3.3 Pending
X9DRH-7/i(T)F Special Order Not Affected Special Order Not Affected Not Affected v3.3 v3.3 Pending
X9DR3/i-F Special Order Not Affected Special Order Not Affected Not Affected v3.3 v3.3 Pending
X9DRT-H Series Special Order Not Affected Special Order Not Affected Not Affected v3.3 v3.3 Pending
X9DRT Series Special Order Not Affected Special Order Not Affected Not Affected v3.3 v3.3 Pending
X9DR3/i-LN4F+ Special Order Not Affected Special Order Not Affected Not Affected v3.3 v3.3 Pending
X9DRD-7LN4F Series Special Order Not Affected Special Order Not Affected Not Affected v3.3 v3.3 Pending
X9DRD-EF Special Order Not Affected Special Order Not Affected Not Affected v3.3 v3.3 Pending
X9DRL-3/iF Special Order Not Affected Special Order Not Affected Not Affected v3.3 v3.3 Pending
X9DRW-3LN4F+/3TF+ Special Order Not Affected Special Order Not Affected Not Affected v3.3 v3.3 Pending
X9DRW-3/iF Special Order Not Affected Special Order Not Affected Not Affected v3.3 v3.3 Pending
X9DRW-7/iTPF+ Special Order Not Affected Special Order Not Affected Not Affected v3.3 v3.3 Pending
X9DBL-3/i(F) Special Order Not Affected Special Order Not Affected Not Affected v3.3 v3.3 Pending
X9DA7/E Special Order Not Affected Special Order Not Affected Not Affected v3.3 v3.3 Pending
X9DAi Special Order Not Affected Special Order Not Affected Not Affected v3.3 v3.3 Pending
X9DB3/i-(TP)F Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DBS-F(-2U) Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DBU-3/iF Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DR7/E-LN4F Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DR7/E-TF+ Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DR7-JLN4F Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRD-L/iF Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRD-iT+ Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRD-C(N)T+ Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRFR Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRFF(-7) Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRFF-7/i(T)+ Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRFF-7/i(T)G+ Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRG-H(T)F+ Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRG-H(T)F+II Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRG-QF Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRG-O(T)F-CPU Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRL-7/EF Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRT-P Series Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRT-HF+ Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRW-C(T)F31 Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRW-7/iTPF Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRH-iF-NV Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DRX+-F Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DAX-7/i(T)F Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DAX-7/iF-HFT Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9DAL-3/i Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending

  Single Processor (1P) X9 Systems (top)

Intel QSR 2019.1 Intel QSR 2018.4 Spectre Meltdown BMC Virtual Media
Intel Advisory Intel-SA-00213 Intel-SA-00223 Intel-SA-00233 Intel-SA-00185 Intel-SA-00191 Intel-SA-00088 Intel-SA-00115 / Intel-SA-00161
Motherboard BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BMC Version
X9SRE/i Series Special Order Not Affected Special Order Not Affected Not Affected v3.3 v3.3 Pending
X9SRH-7(T)F Special Order Not Affected Special Order Not Affected Not Affected v3.3 v3.3 Pending
X9SRD-F Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9SRW-F Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9SRG-F Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9SRL(-F) Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9SRA Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9SAE(-V) Special Order Not Affected Special Order Not Affected Not Affected v2.3 v2.3 Pending
X9SCL+-F Special Order Not Affected Special Order Not Affected Not Affected v2.3 v2.3 Pending
X9SCL(-F) Special Order Not Affected Special Order Not Affected Not Affected v2.3 v2.3 Pending
X9SCM(-F) Special Order Not Affected Special Order Not Affected Not Affected v2.3 v2.3 Pending
X9SCD Series Special Order Not Affected Special Order Not Affected Not Affected v2.3 v2.3 Pending
X9SCA(-F) Special Order Not Affected Special Order Not Affected Not Affected v2.3 v2.3 Pending
X9SCI-LN4(F) Special Order Not Affected Special Order Not Affected Not Affected v2.3 v2.3 Pending

  Multi-Processor X9 Motherboards (top)

Intel QSR 2019.1 Intel QSR 2018.4 Spectre Meltdown BMC Virtual Media
Intel Advisory Intel-SA-00213 Intel-SA-00223 Intel-SA-00233 Intel-SA-00185 Intel-SA-00191 Intel-SA-00088 Intel-SA-00115 / Intel-SA-00161
Motherboard BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BMC Version
X9QRi-F Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9QR7-TF Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9QRi-F+ Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
X9QR7-TF+ Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending

  SuperBlade Systems (top)

Intel QSR 2019.1 Intel QSR 2018.4 Spectre Meltdown BMC Virtual Media
Intel Advisory Intel-SA-00213 Intel-SA-00223 Intel-SA-00233 Intel-SA-00185 Intel-SA-00191 Intel-SA-00088 Intel-SA-00115 / Intel-SA-00161
Motherboard BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BIOS Version BMC Version
B9DRi Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
B9DR7 Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
B9DRP Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
B9DRG-3M Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
B9DRG-E Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
B9DRG Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
B9DRT Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending
B9QR7(-TP) Special Order Not Affected Special Order Not Affected Not Affected v3.3 is required v3.3 is required Pending

Dual & Single Processor H12 Systems (top)

SEV-ECC Spectre Meltdown BMC Virtual Media CVE-2019-6260
AMD Advisory CVE-2019-9836 Intel-SA-00088 Intel-SA-00115 / Intel-SA-00161
Motherboard BIOS Version BIOS Version BIOS Version BMC Version BMC Version
H12DST-B Pending v 1.1 Not Affected Pending v 3.02
H12SSW-NT Pending v 1.0c Not Affected Pending v 3.03
H12SSW-iN Pending v 1.0c Not Affected Pending v 3.03
H12SST-PS Pending v 1.0b Not Affected Pending v 3.04

  Dual & Single Processor H11 Systems (top)

SEV-ECC Spectre Meltdown BMC Virtual Media CVE-2019-6260
AMD Advisory CVE-2019-9836 Intel-SA-00088 Intel-SA-00115 / Intel-SA-00161
Motherboard BIOS Version BIOS Version BIOS Version BMC Version BMC Version
H11DSU-iN Pending v 1.1 Not Affected Pending Pending
H11DSi v 1.3 v 1.0c Not Affected Pending v 1.46
H11DSi-NT v 1.3 v 1.0c Not Affected Pending v 1.46
H11DST-B v 1.3 v 1.0b Not Affected Pending v 1.46
H11SSL-i Pending v 1.0a Not Affected Pending v 1.46
H11SSL-C Pending v 1.0a Not Affected Pending v 1.46
H11SSL-NC Pending v 1.0a Not Affected Pending v 1.46
H11SSW-iN Pending v 1.0a Not Affected Pending Pending
H11SSW-NT Pending v 1.0a Not Affected Pending Pending

  Dual, Single & Multi-Processor H8 Motherboards (top)

Motherboard Download Patch Comments
H8DGU-LN4F+
H8DGT-H Series
H8DG6(-F)
H8DGi(-F)
H8DGU(-F)
H8DGG-QF
H8DCL-6(F)
H8DCL-i(F)
H8DCT-F
H8DCT-IBQ(F)
H8DCT-HIBQF
H8DCT-HLN4F
H8SCM(-F)
H8SGL(-F)
H8SME-F
H8SML-7/i(F)
H8QG6(+)-F
H8QGi(+)-F
H8QGL-6F(+)
H8QGL-6F(+)
H8QG7(+)-LN4F
H8QGi(+)-LN4F
BHDGT
BHQGE
Not Available Immune to Intel-SA-00115 / Intel-SA-00161
my-tracker_cpteSecurity Vulnerabilities Table
read more

Multiple Vulnerabilities in PHP Could Allow for Arbitrary Code Execution

MS-ISAC ADVISORY NUMBER:

2019-087

DATE(S) ISSUED:

09/03/2019

OVERVIEW:

Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for arbitrary code execution. PHP is a programming language originally designed for use in web-based applications with HTML content. PHP supports a wide variety of platforms and is used by numerous web-based software applications. Successfully exploiting the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the affected application. Depending on the privileges associated with the application, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights. Failed exploitation could result in a denial-of-service condition.

THREAT INTELLIGENCE:

There are currently no reports of these vulnerabilities being exploited in the wild.

SYSTEMS AFFECTED:

  • PHP 7.1 versions prior to 7.1.32
  • PHP 7.2 versions prior to 7.2.22
  • PHP 7.3 versions prior to 7.3.9

RISK:

Government:
  • Large and medium government entities: HIGH
  • Small government entities: HIGH
Businesses:
  • Large and medium business entities: HIGH
  • Small business entities: HIGH
Home Users:

LOW

TECHNICAL SUMMARY:

Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for arbitrary code execution. Details of these vulnerabilities are as below:

Version 7.3.9

  • Bug #78363 (Buffer overflow in zendparse)
  • Bug #78379 (Cast to object confuses GC, causes crash)
  • Bug #78412 (Generator incorrectly reports non-releasable $this as GC child)
  • Bug #77946 (Bad cURL resources returned by curl_multi_info_read()
  • Bug #78333 (Exif crash (bus error)
  • Bug #77185 (Use-after-free in FPM master event handling)
  • Bug #78342 (Bus error in configure test for iconv //IGNORE)
  • Bug #78380 (Oniguruma 6.9.3 fixes CVEs)
  • Bug #78179 (MariaDB server version incorrectly detected)
  • Bug #78213 (Empty row pocket)
  • Bug #77191 (Assertion failure in dce_live_ranges()
  • Bug #69100 (Bus error from stream_copy_to_stream (file -> SSL stream)
  • Bug #78282 (atime and mtime mismatch)
  • Bug #78326 (improper memory deallocation on stream_get_contents()
  • Bug #78346 (strip_tags no longer handling nested php tags)

Version 7.2.22

  • Bug #78363 (Buffer overflow in zendparse)
  • Bug #78379 (Cast to object confuses GC, causes crash)
  • Bug #77946 (Bad cURL resources returned by curl_multi_info_read()
  • Bug #78333 (Exif crash (bus error)
  • Bug #78342 (Bus error in configure test for iconv //IGNORE)
  • Bug #78179 (MariaDB server version incorrectly detected)
  • Bug #77191 (Assertion failure in dce_live_ranges()
  • Bug #69100 (Bus error from stream_copy_to_stream (file -> SSL stream)
  • Bug #78282 (atime and mtime mismatch)
  • Bug #78326 (improper memory deallocation on stream_get_contents()

Version 7.1.32

  • Bug #75457 (heap use-after-free in pcrelib)

Successfully exploiting the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the affected application. Depending on the privileges associated with the application, an attacker could install programs; view, change, or delete data; or create new accounts with full user rights. Failed exploitation could result in a denial-of-service condition.

RECOMMENDATIONS:

We recommend the following actions be taken:

  • Upgrade to the latest version of PHP immediately, after appropriate testing.
  • Verify no unauthorized system modifications have occurred on system before applying patch.
  • Apply the principle of Least Privilege to all systems and services.
  • Remind users not to visit websites or follow links provided by unknown or untrusted sources.

REFERENCES:

my-tracker_cpteMultiple Vulnerabilities in PHP Could Allow for Arbitrary Code Execution
read more

Cisco Finesse Request Processing Server-Side Request Forgery Vulnerability

No comments
Medium
Advisory ID:
cisco-sa-20190904-finesse-ssrf
First Published:
2019 September 4 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvo92074
CVSS Score:Base 5.3
CVE-2019-12632
CWE-20
my-tracker_cpteCisco Finesse Request Processing Server-Side Request Forgery Vulnerability
read more

Cisco Identity Services Engine Cross-Site Scripting Vulnerability

Medium
Advisory ID:
cisco-sa-20190904-ise-xss
First Published:
2019 September 4 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvp98851 
CVSS Score:Base 6.1
CVE-2019-12644
CWE-79
my-tracker_cpteCisco Identity Services Engine Cross-Site Scripting Vulnerability
read more

Cisco Jabber Client Framework for Mac Code Execution Vulnerability

Medium
Advisory ID:
cisco-sa-20190904-jcf-codex
First Published:
2019 September 4 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvq04288
CVSS Score:Base 6.7
CVE-2019-12645
CWE-20
my-tracker_cpteCisco Jabber Client Framework for Mac Code Execution Vulnerability
read more

Cisco Content Security Management Appliance Information Disclosure Vulnerability

Medium
Advisory ID:
cisco-sa-20190904-sma-info-dis
First Published:
2019 September 4 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvp62827
CVSS Score:Base 4.3
CVE-2019-12635
CWE-285
my-tracker_cpteCisco Content Security Management Appliance Information Disclosure Vulnerability
read more

Cisco Unified Contact Center Express Request Processing Server-Side Request Forgery Vulnerability

Medium
Advisory ID:
cisco-sa-20190904-unified-ccx-ssrf
First Published:
2019 September 4 16:00 GMT
Version 1.0: Final
Workarounds:
No workarounds available
Cisco Bug IDs: CSCvp65375
CVSS Score:Base 5.3
CVE-2019-12633
CWE-20
my-tracker_cpteCisco Unified Contact Center Express Request Processing Server-Side Request Forgery Vulnerability
read more

Cisco Industrial Network Director Configuration Data Information Disclosure Vulnerability

High
Advisory ID:
cisco-sa-20190904-ind
First Published:
2019 September 4 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs: CSCvn44649
CVSS Score:Base 7.5
CVE-2019-1976
CWE-200
my-tracker_cpteCisco Industrial Network Director Configuration Data Information Disclosure Vulnerability
read more

Cisco Webex Teams Logging Feature Command Execution Vulnerability

High
Advisory ID:
cisco-sa-20190904-webex-teams
First Published:
2019 September 4 16:00 GMT
Version 1.0: Final
Workarounds: No workarounds available
Cisco Bug IDs:CSCvp30119
CVSS Score:Base 7.5
CVE-2019-1939
CWE-74
my-tracker_cpteCisco Webex Teams Logging Feature Command Execution Vulnerability
read more

CVE-2019-10197

No comments
==============================================================================
== Subject:     Combination of parameters and permissions can allow user
==              to escape from the share path definition.
==
== CVE ID#:     CVE-2019-10197
==
== Versions:    All versions of Samba from 4.9.0 onwards.
==
== Summary:     Under certain parameter configurations, when an SMB
==              client accesses a network share and the user does not
==              have permission to access the share root directory,
==              it is possible for the user to escape from the share
==              to see the complete '/' filesystem. Unix permission
==              checks in the kernel are still enforced.
==
==============================================================================

===========
Description
===========

On a Samba SMB server for all versions of Samba from 4.9.0 clients are
able to escape outside the share root directory if certain
configuration parameters set in the smb.conf file.

The problem is reproducable if the 'wide links' option is explicitly
set to 'yes' and either 'unix extensions = no' or 'allow insecure wide
links = yes' is set in addition.

If a client has no permissions to enter the share root directory it
will get ACCESS_DENIED on the first request. However smbd has a cache
that remembers if it successfully changed to a directory. This cache
was not being reset on failure. The following SMB request will then
silently operate in the wrong directory instead of returning
ACCESS_DENIED. That directory is either the share root directory of a
different share the client was operating on successfully before or the
global root directory ('/') of the system.

The unix token (uid, gid, list of groups) is always correctly
impersonated before each operation, so the client is still restricted
by the unix permissions enfored by the kernel.

==================
Patch Availability
==================

A patch addressing this defect has been posted to:

  https://www.samba.org/samba/security/

Additionally, Samba 4.9.13, 4.10.8 and 4.11.0rc3 have been issued as
security releases to correct the defect. Patches against older Samba
versions may be available at https://samba.org/samba/patches/. Samba
vendors and administrators running affected versions are advised to
upgrade or apply the patch as soon as possible.

==================
CVSSv3 calculation
==================

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:H/RL:O/RC:C (8.7)

==========
Workaround
==========

The following methods can be used as a mitigation (only one is
needed):

- Use the 'sharesec' tool to configure a security descriptor for the
  share that's at least as strict as the permissions on the share root
  directory.

- Use the 'valid users' option to allow only users/groups which are
  able to enter the share root directory.

- Remove 'wide links = yes' if it's not really needed.

- In some situations it might be an option to use 'chmod a+x' on the
  share root directory, but you need to make sure that files and
  subdirectories are protected by stricter permissions. You may also
  want to 'chmod a-w' in order to prevent new top level files and
  directories, which may have less restrictive permissions.

=======
Credits
=======

This problem was found by Stefan Metzmacher of SerNet and the Samba
Team.

Patches provided by Ralph Böhme and Stefan Metzmacher of SerNet and
the Samba Team together with Jeremy Allison of Google and the Samba
Team.

==========================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
==========================================================
my-tracker_cpteCVE-2019-10197
read more