News Categories
RSS Feed
News
Mar
12
Mikrotik - Mitigating the "Slingshot" malware
Posted by Florin Finaru on 12 March 2018 03:00 PM

As researchers have found an advanced malware running on Mikrotik switches, we advise our customers to verify and update if required to a version higher than RouterOS v6.38.5 , which fixes the vulnerability that allows attackers to gain control over the operating system. All Tranquil PC V6XD and V4N products shipped prior to March 2017 are liable to this vulnerability.

Please see the following link for further information on this potential threat and contact our Support Team if further assistance is required.

https://www.wired.com/story/router-hacking-slingshot-spy-operation-compromised-more-than-100-targets/


Read more »



Jan
11
Meltdown and Spectre Mitigation
Posted by Florin Finaru on 11 January 2018 10:18 AM

Two new security vulnerabilities have been made public, which affect nearly all devices containing a processor. Due to these chip design flaws, an attacker is able to run a speculative execution side channel attack and manipulate a system under certain conditions (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754). As a result, our entire range of past and current products is affected.

Mitigation

In order to mitigate the vulnerabilities, your systems will require to be updated:
OS update - Fixes for Meltdown and Spectre v1

Microsoft has already released updates for Windows 7, Windows 8, Windows 10 and various releases of Windows Server. Kernel updates are available as well for all major Linux distributions.

Microcode (BIOS) update - Fix for Spectre v2

Intel and other component manufacturers will start releasing patches the week commencing 15.01.2018. We will update this page as these become available.

Impact on performance

Applying these updates will impact performance though. It is currently reported that the latest CPU models (Skylake, Kabylake or newer) are going to be the least affected, with an increased impact for older generations.


If further assistance is required, please contact our support team via the ticketing system.


Read more »



Jan
10
BMC - JViewer launch fix
Posted by Florin Finaru on 10 January 2018 02:03 PM

Our products from the MSC3, V5 and V6 families were recently affected by a limitation caused by a Java update: http://tranquilpc-support.co.uk/index.php?/News/NewsItem/View/65/unable-to-launch-the-application---error-received-when-running-jviewer

A firmware update is now available for these products, which fixes the aforementioned issue. Please download the file from the link bellow and update the firmware.

  1. Download the BMC update file: ftp://europe.asrock.com/BIOS/Server/D1541D4I(00.17.00)BMC.zip
  2. Login to the BMC web UI.
  3. Navigate to the "Firmware Update" page and "Enter Update Mode". If you wish to preserve the current configuration, please select this option on the same page.
  4. Select the downloaded update file and "Upload" to the node.
  5. BMC will restart at the end of the process. As soon as the web UI is available again, JViewer can be used with the latest version of Java.

Read more »



Jul
14
Website Update
Posted by Jack Riley on 14 July 2017 12:00 PM

 

Hi - Tranquil PC have recently updated our public website to reflect the current product range and services.

Please take a look at any time - any feedback is warmly welcomed

 

We're still busy designing and manufacturing standard and bespoke products at our Manchester (UK) facility

- feel free to contact us if you need us, any time!

 

 


Read more »



May
11
Mitigating Intel AMT Privilege Escalation Vulnerability
Posted by Florin Finaru on 11 May 2017 11:27 AM

A critical vulnerability was announced by Intel for products that run Active Management Technology alongside Management Engine. The vulnerability, registered as CVE-2017-5689, allows attackers to escalate and gain system privileges. The official notice and further information can be found by accessing the following link https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00075&languageid=en-fr .

As the NUC5i5MYBE motherboards are affected by the vulnerability and these are used in our V4N units, we advise our customers to update BIOS to version MYi50035 in order to mitigate the issue. Furthermore, the INTEL-SA-00075 detection tool can be downloaded from the following link in order to confirm the motherboard is running the correct ME version, https://downloadcenter.intel.com/download/26755 .

To update BIOS, follow the steps bellow:

  1. Download the MYi50035.BIO file from this link https://downloadcenter.intel.com/download/26789/NUCs-BIOS-Update-MYBDWi5v-86A-?product=84862 
  2. Copy the MYi50035.BIO file to a flash drive
  3. Connect the flash drive, a keyboard and monitor the motherboard
  4. Power up the motherboard and press the F7 key at the POST screen to access the BIOS Update utility
  5. Navigate to the location on the flash drive where the MYi50035.BIO file was saved and start the update
  6. Wait until this process has ended and confirm enter BIOS to confirm the version was updated to "MYBDWi5v.86A.0035.2017.0506.1649"

If further assistance is required, please contact our support team via the ticketing system.


Read more »



May
9
"Unable to launch the application." - Error received when running JViewer
Posted by Florin Finaru on 09 May 2017 03:48 PM

It has recently come to our attention that the JViewer applet used for remote desktop control of all motherboards used in our MSC3, V5XD and V6XD line of products, will stop working if the system is running Java Version 8 Update 131 or later. This is due to new security measures put in place in this last update, which disables the MD5 algorithm used by the firmware on the motherboards.

Until the motherboard vendor releases a firmware version that resolves the problem, you can use one of the two methods below to bypass this issue:

  • Use the last working version of Java runtime, Version 8 Update 121.

If a rollback is required, you can download it from our FTP server.

  • Remove the MD5 entry from the Java security configuration file:

Change line 573 in C:\Program Files (x86)\Java\jre1.8.0_131\lib\security\java.security from:

jdk.jar.disabledAlgorithms=MD2, MD5, RSA keySize < 1024

to

jdk.jar.disabledAlgorithms=MD2, RSA keySize < 1024





Read more »