BIOS update program (V3.00L16/V3.10L16/V4.00L18/V4.10L18/V4.30L18 ) CF-31[S/U], CF-31V, CF-31[W/X], CF-31Y series

Category Application and Utility,BIOS/EC/Firmware
Model

CF-31[S/U] (mk3), CF-31V (mk3), CF-31[W/X] (mk4), CF-31Y (mk4)

CF-31[S/U]****** Standard model
CF-31V****** Value model
CF-31[W/X]****** Standard model
CF-31XML55[C/L]M, CF-31WML51[C/L]M, CF-31WML58[C/L]M Value model
CF-31Y****** non vPro model

("*" : wildcard character)

Operating System Windows 8.1 64bit, 8 64bit, 7 (32bit/64bit)
Language MUI,English
Release Date 11/20/18
File Name BIOS_31_V300L16.exe 3,472,304 bytes
BIOS_31_V310L16.exe 3,377,336 bytes
BIOS_31_V400L18.exe 3,512,832 bytes
BIOS_31_V410L18.exe 3,416,624 bytes
BIOS_31_V430L18.exe 3,512,896 bytes
ChiefRiver_BIOS_UpdateProcedure_eng.pdf 174,404 bytes
Index No 78253

File Description

This software is intended to update the BIOS of the target model.

The version after applying this software is as follows.

- CF-31[S/U] (mk3) Standard model V3.00L16
- CF-31V (mk3) Value model V3.10L16
- CF-31[W/X] (mk4) Standard model V4.00L18
- CF-31[W/X] (mk4) Value model
 CF-31XML55[C/L]M
 CF-31WML51[C/L]M
 CF-31WML58[C/L]M
V4.10L18
- CF-31Y non vPro model V4.30L18

Reason for Update

We released the counter measure modules for the following vulnerabilities.

  1. Side Channel Analysis(Intel-SA-00088)

    Vulnerability information from Panasonic

     » Security information of vulnerability by Speculative Execution and Indirect Branch Prediction Side Channel Analysis Method

  2. Q2 2018 Speculative Execution Side Channel Update (INTEL-SA-00115)

     ≫ Q2 2018 Speculative Execution Side Channel Update

  3. Q3 2018 Speculative Execution Side Channel Update (INTEL-SA-00161)

     ≫ Q3 2018 Speculative Execution Side Channel Update

Notes

* Please read the update procedure carefully, before using the update program.