Global Technical Service Europe Technical Service
Security Notice - Statement on Intel TSX Asynchronous Abort (TAA)
Initial Release Date:2019-11-15 08:30:08
Last Release Date:2019-11-16 16:37:28
Security Notices:

On November 12, 2019, Intel disclosed several potential security vulnerabilities. These potential security vulnerabilities may allow escalation of privilege, denial of service or information disclosure. Intel is releasing firmware and software updates to mitigate these potential vulnerabilities. The vulnerability details are as follows:
Intel-SA-00240: CVE-2019-0151
Insufficient memory protection in Intel(R) TXT for certain Intel(R) Core Processors and Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel-SA-00241: CVE-2019-11090(fTPM), CVE-2019-11109
Potential security vulnerabilities(Improper directory permissions、Cryptographic timing conditions) in Intel® Server Platform Services (SPS) may allow escalation of privilege, denial of service or information disclosure.
Intel-SA-00270: CVE-2019-11135
TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
Intel-SA-00271: CVE-2019-11139
Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access.
Intel-SA-00280: CVE-2019-11136, CVE-2019-11137
Potential security vulnerabilities(insufficient input validation、insufficient access control) in Intel firmware may allow escalation of privilege, denial of service and/or information disclosure.
Inspur started the relevant investigation work in the first time. Inspur ISRC will update the security notice at any time. Please keep an eye on the security bulletin for this incident.

Inspur Products Affected:

Inspur Server M5 products have vulnerabilities Intel-SA-00240, Intel-SA-00270, Intel-SA-00271, Intel-SA-00280. The detailed affected products are shown in the following table:

Product Name Affected Version
4.1.07 and earlier
SN5161M5 4.1.01 and earlier
NF8480M5 4.1.10 and earlier
NX5460M5 4.1.03 and earlier
NF5288M5 4.1.05 and earlier
TS860M5 4.1.09 and earlier
NF5280M5 4.1.11 and earlier
NF5466M5 4.1.8 and earlier
NF5180M5 4.1.5 and earlier
NS5162M5 4.1.6 and earlier
NF5266M5 3.1.3 and earlier
NF5270M5 4.1.2 and earlier
NF8380M5 4.1.3 and earlier
NF8260M5 4.1.11 and earlier
NF5468M5 3.1.6 and earlier
3.1.3 and earlier
NF5568M5 3.1.0 and earlier

Revision History:

2019-11-16 V1.1 Increase the list of affected products

2019-11-15 V1.0 Initial

Inspur Security Procedures:

Inspur is committed to ensuring user safety, working to resolve issues quickly when problems arise, and providing recommendations through security advisories and security notices.
If you have information about a security issue or vulnerability with Inspur products and solutions, please send an e-mail to For details, please visit:
If you require technical support, please visit:

Reference links:



Inspur Group News Events


Download Center Service & Warranty
  • E-Waste Collection Service
  • Security Bulletins

    Where to buy


    Contact Us Join Us


    Facebook Instagram Twitter

    Copyright © 2018 Inspur. All Rights Reserved.

    inspur logo
    • Support:


    • Sales Inquiries: