THE POSSIBILITIES ARE INFINITE

  1. Home > Support > Mobile

Infineon TPM Vulnerability


The information below includes a description of the vulnerability and details the steps recommended by Infineon and Fujitsu that users should take to secure affected product lines.

Summary:
A vulnerability in Infineon TPM hardware has been discovered recently with outdated TPM firmware using an algorithm that generates weaker RSA keys. This page provides information on how to update outdated TPM firmware.

For more detailed information please refer to the Infineon web site:
http://www.infineon.com/TPM-update

Microsoft has published additional information relating to operating systems. For detailed information please refer to the Microsoft web site: https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV170012

Affected Products:
An overview of the Fujitsu affected products can be found here:

Model Name Original FW Version Updated FW Version Update Type Release Date1
LIFEBOOK E544 LIFEBOOK E554 FW4.32 FW4.34 FW Update Utility Q1 2018
LIFEBOOK E546 LIFEBOOK E556 FW5.51 FW5.62 BIOS update and FW Tool2 Jan 2018
LIFEBOOK E547 LIFEBOOK E557 FW5.61 FW5.62 BIOS update and FW Tool2 Jan 2018
LIFEBOOK E734 LIFEBOOK E744 LIFEBOOK E754 FW4.32 FW4.34 FW Update Utility Q1 2018
LIFEBOOK E736 LIFEBOOK E746 LIFEBOOK E756 FW5.51 FW5.62 BIOS update and FW Tool2 Jan 2018
LIFEBOOK P727 FW5.61 FW5.62 BIOS update and FW Tool2 Jan 2018
LIFEBOOK T725 FW4.40 FW4.43 FW Update Utility Available for W7 & W10, W8.1 Dec 2017
LIFEBOOK T726 FW5.51 FW5.62 BIOS update and FW Tool2 Jan 2018
LIFEBOOK T734 FW4.32 FW4.34 FW Update Utility Q1 2018
LIFEBOOK T904 FW4.32 FW4.34 FW Update Utility Q1 2018
LIFEBOOK T935 FW4.40 FW4.43 FW Update Utility Available for W7 & W10, W8.1 Dec 2017
LIFEBOOK T936 FW5.51 FW5.62 BIOS update and FW Tool2 Jan 2018
LIFEBOOK T937 FW5.61 FW5.62 BIOS update and FW Tool2 Jan 2018
LIFEBOOK U727 FW5.61 FW5.62 BIOS update and FW Tool2 Jan 2018
LIFEBOOK U727 6th Gen FW5.61 FW5.62 BIOS update and FW Tool2 Jan 2018
LIFEBOOK U745 FW5.51 FW5.62 BIOS update and FW Tool2 Jan 2018
LIFEBOOK U747 LIFEBOOK U757 FW5.61 FW5.62 BIOS update and FW Tool2 Jan 2018
LIFEBOOK U747 6th Gen LIFEBOOK U757 6th Gen FW5.61 FW5.62 BIOS update and FW Tool2 Jan 2018
LIFEBOOK U904 FW4.32 FW4.34 FW Update Utility Q1 2018
LIFEBOOK U937 FW5.61 FW5.62 BIOS update and FW Tool2 Jan 2018
STYLISTIC Q616 FW5.51 FW5.62 BIOS update and FW Tool2 Jan 2018
STYLISTIC Q665 FW4.40 FW4.43 FW Update Utility Available for W7 & W10, W8.1 Dec 2017
STYLISTIC Q704 FW4.32 FW4.34 FW Update Utility Q1 2018
STYLISTIC Q736 FW5.51 FW5.62 BIOS update and FW Tool2 Jan 2018
STYLISTIC Q737 FW5.61 FW5.62 BIOS update and FW Tool2 Jan 2018
STYLISTIC Q775 FW4.40 FW4.43 FW Update Utility Available for W7 & W10, W8.1 Dec 2017
1. Dates are subject to change
2. The FW Tool must be used with BIOS update, although the BIOS update can be applied separately.


Fujitsu is providing an easy to use Windows-based tool for end customers to identify whether a TPM is installed in their system. If the tool finds a TPM in the system, then it will show the relevant TPM and firmware version. This tool can be found here: TPM Information Tool
Please note: for some affected products, TPM was sold as an optional component. This means that not all systems are affected by this issue.

Recommended steps:

  1. Consult the list of affected Fujitsu systems.
  2. Before updating the TPM firmware, please make sure that you save your encryption keys, decrypt all your encrypted data and backup to an external storage device, to avoid any data loss.
  3. To download the respective TPM firmware update package for your system, please go to the Fujitsu Support page http://support.fujitsupc.com/CS/Portal/support.do?srch=DOWNLOADS and perform the following steps:

WARNING: Clearing the TPM resets it to factory defaults. All created keys will be deleted and you will therefore lose access to any data encrypted by those keys.
For more detailed information regarding TPM Clear please refer also to the following Microsoft site:
https://docs.microsoft.com/en-us/windows/device-security/tpm/initialize-and-configure-ownership-of-the-tpm#clear-all-the-keys-from-the-tpm