
IntelĀ® Microarchitectural Data Sampling Advisory Security Vulnerability
- Document ID: 4016572
- Posted Date: 2019-08-05
- Last Updated: 2019-08-05
- Distribution: View Public Website
- Issue
Intel® Microarchitectural Data Sampling Advisory Security Vulnerability
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Source: Intel® Article ID: Intel SA-00233
Potential Security Impact: Toshiba is aware of the Intel® Microarchitectural Data Sampling Advisory security vulnerability. The security and privacy of our customers' information are priorities for Toshiba. Toshiba is working closely with Intel to provide firmware and/or software updates as soon as possible to resolve this security vulnerability. Update details for these platforms will be added to this document as they become available.
In the meantime, Toshiba recommends that customers update their systems to the latest Toshiba firmware and software, apply all of Microsoft System Updates as they become available and follow security best practices for malware protection to help prevent possible exploitation of these vulnerabilities. These practices include, but are not limited to, promptly deploying software updates, avoiding unknown hyperlinks and websites, never downloading files or applications from unknown sources, and employing up-to-date anti-virus and advanced threat protection solutions.
In addition, Toshiba encourages customers to review both Intel’s Security Advisory and the Microsoft Advisory Notice for information, including appropriate identification and mitigation measures.
Available Resources:
- Intel Security Advisory (INTEL-SA-00233)
- Resolution
Resolution:
- Check Table below to see if your system has been impacted and the vulnerability update is available.
- No actions are required if you system is not listed.
Product Name
Model Number
Estimated BIOS Release Date
Link to Firmware
PORTEGE A30-D
PT38B
Available
PORTEGE R30-D
PT381
Available
PORTEGE R30-D
PT383
Available
PORTEGE R30-D
PT384
Available
PORTEGE R30-D
PT385
Available
PORTEGE R30-D
PT387
Available
PORTEGE R30-D
PT389
Available
PORTEGE X20W-E
PRT20
Available
PORTEGE X20W-E
PRT21
Available
PORTEGE X20W-E
PRT22
Available
PORTEGE X20W-E
PRT23
Available
PORTEGE X20W-E
PRT24
Available
PORTEGE X30-E
PT282
Available
PORTEGE X30-E
PT284
Available
SATELLITE PRO R50-D
PS581
Available
SATELLITE PRO R50-D
PS582
Available
TECRA A40-D
PS481
Available
TECRA A40-D
PS482
Available
TECRA A40-D
PS483
Available
TECRA A40-D
PS484
Available
TECRA A40-D
PS485
Available
TECRA A40-D
PS486
Available
TECRA A50-D
PS585
Available
TECRA A50-D
PS586
Available
TECRA A50-D
PS587
Available
TECRA A50-D
PS588
Available
TECRA A50-D
PS589
Available
TECRA A50-D
PS58A
Available
TECRA A50-D
PS58B
Available
TECRA A50-D
PT583
Available
TECRA A50-E
PT5A1
Available
TECRA A50-E
PT5A2
Available
TECRA A50-E
PT5A3
Available
TECRA A50-E
PT5A4
Available
TECRA A50-E
PZ5A1
Available
TECRA A50-E
PZ5A2
Available
TECRA X40-E
PT482
Available
TECRA X40-E
PT484
Available
TECRA Z50-D
PT581
Available
The information in this document is subject to change without notice.
"Intel" is a trademark of Intel Corporation in the U.S. and other countries.
Other names and brands may be claimed as the property of others.- Check Table below to see if your system has been impacted and the vulnerability update is available.
- Export Control and EULA
- Use of any software made available for download from this system constitutes your acceptance of the Export Control Terms and the terms in the Dynabook end-user license agreement both of which you can view before downloading any such software.