About countermeasure to Wi-Fi WPA2 (Wi-Fi Protected Access II) vulnerability problem
Release Date: November 21, 2017 Updated: November 20, 2018
The Wi-Fi WPA2 (Wi-Fi Protected Access II) vulnerability information has been published.
We will show the information below.
Please be updated that the information will be changed or added without notice.
■Target model
Panasonic Windows OS-equipped model (except FZ-E1 / FZ-F1).
■content of countermeasure
[1] OS
Microsoft has been informed of countermeasure to vulnerability.
Please apply the update program to the following target OS according to the guidance of Microsoft Corporation.
Microsoft site 
[target OS]
Windows 7 SP1, Windows 8.1, Windows 10(Version1709 is not applicable)
Return to Top
[2] Wi-Fi driver
We will inform you of countermeasure for vulnerability.
Target model |
OS |
Countermeasure module |
CF-LX6Y (mk3)
CF-SZ6R Asia-model (mk2)
CF-XZ6R (mk1)
|
Windows 10 |
Download ▶ Released on December 19, 2017 |
CF-MX4E (mk1)
CF-SX4E Asia-model (mk1)
|
Windows 10 |
Download ▶ Released on December 19, 2017 |
Windows 8.1 |
Download ▶ Released on March 19, 2018 Updated on July 31, 2018 |
Windows 7 |
Download ▶ Released on February 13, 2018 Updated on September 4, 2018 |
CF-AX3E (mk2)
CF-LX3E (mk2)
CF-LX3J (mk3)
|
Windows 10 |
Download ▶ Released on December 19, 2017 |
Windows 8.1 |
Download ▶ Released on March 19, 2018 Updated on July 31, 2018 |
Windows 7 |
Download ▶ Released on February 13, 2018 |
CF-20[A/B/C/D] (mk1)
|
Windows 10 |
Download ▶ Released on December 19, 2017 |
Windows 7 |
Download ▶ Released on February 13, 2018 Updated on September 4, 2018 |
CF-33[A/B/C/L/M/N/V/W] (mk1)
CF-54[G/H/J] (mk3)
FZ-M1[D/ECD] (mk2)
|
Windows 10 |
Download ▶ Released on December 19, 2017 |
CF-33[D/E/P/Q] (mk1)
CF-54[D/E/F] (mk2)
CF-54[G/H/J] (mk3)
CF-D1[N/Q] (mk3)
FZ-G1[P/Q/R/S/T] (mk4)
FZ-M1[ECF/F] (mk2)
FZ-Q2[F/G] (mk1)
FZ-Y1D (mk2)
|
Windows 10 |
Download ▶ Released on December 19, 2017 |
Windows 7 |
Download ▶ Released on February 13, 2018 Updated on September 4, 2018 |
CF-31[1/2/3/4] (mk5)
CF-54[A/B/C] (mk1)
FZ-G1[J/K/L/M/N] (mk3)
FZ-Y1C (mk2)
|
Windows 10 |
Download ▶ Released on December 19, 2017 |
Windows 8.1 |
Download ▶ Released on March 19, 2018 Updated on July 31, 2018 |
Windows 7 |
Download ▶ Released on February 13, 2018 Updated on September 4, 2018 |
FZ-M1A (mk1)
FZ-R1[A/F] (mk1)
FZ-Q1A (mk1)
|
Windows 10 |
Download ▶ Released on December 19, 2017 |
Windows 8.1 |
Download ▶ Released on March 19, 2018 Updated on July 31, 2018 |
CF-53[2/3/4/5/7] (mk4)
CF-C2C (mk2/mk2.5)
FZ-G1F (mk2)
FZ-M1C (mk1)
FZ-Q1C (mk1)
|
Windows 10 |
Download ▶ Released on December 19, 2017 |
Windows 8.1 |
Download ▶ Released on March 19, 2018 Updated on July 31, 2018 |
Windows 7 |
Download ▶ Released on February 13, 2018 |
CF-19[0/1/2/3] (mk6)
CF-19[5/6/8/9] (mk7)
CF-19Z (mk8)
CF-31[S/U/V] (mk3)
CF-31[W/X/Y] (mk4)
CF-53[J/M] (mk2)
CF-53S (mk3)
CF-AX2L (mk1)
CF-C2A (mk1)
CF-D1[G/K] (mk2)
CF-H2[F/G/H] (mk2)
CF-H2[P/Q/S] (mk3)
CF-SX2J (mk1)
FZ-G1[A/B/C] (mk1)
UT-MA6 (mk1)
UT-MB5 (mk1)
|
Windows 10 Windows 8.1 Windows 7 |
There is no release of countermeasure module. Please confirm Note-1 below. |
∗Note-1 : For models of "no release", please take the following countermeasures.
• Countermeasure 1:
Please apply the update program according to the contents of the above "[1] OS".
• Countermeasure 2:
There is an effect of vulnerability only when WoWLAN is enabled.
(Wake on Wireless LAN : function to resume from sleep state by wireless LAN)
This function is disabled at the time of shipment and will not be enabled unless you change the setting.
[Method of Confirming Setting of WoWLAN]
- Open [Device Manager], open [Network adapters], right click [Intel(R) **** 8265 (or 8260/7265/7260/6250/6235/6205)], click [Properties].
- Click [Power Management] tab.
- WoWLAN is enabled if there is a second check from the top, or if there is also a third check.
- To disable the WoWLAN settings, uncheck the second check from the top and click [OK].
(Note)
If [Intel® Smart Connect Technology] is displayed in the task tray for your PC,
Even if WoWLAN is enabled by the above confirmation method, there is no effect of vulnerability.
Return to Top
[3] ME (Intel® Management Engine)
It affects only when using the Intel® Active Management Technology (AMT) function via wireless LAN.
This function is disabled at the time of shipment and it will not be enabled unless you change the BIOS setting.
Countermeasure module was released in some models.
Group |
Target model |
Detailed model numbers |
Targeted release date |
1 |
CF-33 |
CF-33[A/B/C/L/M/N/V/W]****** (mk1) |
Download ▶ Released on March 9, 2018 Updated on July 10, 2018 |
CF-54 |
CF-54[G/H/J]****** (mk3) |
Download ▶ Released on March 9, 2018 Updated on July 10, 2018 |
CF-LX6 |
CF-LX6YDAZTM (mk3) |
Download ▶ Released on March 9, 2018 Updated on July 10, 2018 |
CF-SZ6 |
CF-SZ6R***** (mk2) |
Download ▶ Released on March 9, 2018 Updated on July 10, 2018 |
CF-XZ6 |
CF-XZ6R***** (mk1) |
Download ▶ Released on March 9, 2018 Updated on July 10, 2018 |
2 |
CF-20 |
CF-20[A/B/C/D]****** (mk1) |
Download ▶ Released on February 15, 2018 Updated on August 28, 2018 |
CF-33 |
CF-33[D/E/P/Q]****** (mk1) |
Download ▶ Released on February 15, 2018 Updated on August 28, 2018 |
CF-54 |
CF-54[D/E/F]****** (mk2) |
Download ▶ Released on February 15, 2018 Updated on August 28, 2018 |
CF-D1 |
CF-D1[N/Q]****** (mk3) |
Download ▶ Released on February 15, 2018 Updated on August 28, 2018 |
FZ-G1 |
FZ-G1[P/Q/R]****** (mk4) |
Download ▶ Released on February 15, 2018 Updated on August 28, 2018 |
FZ-M1 |
FZ-M1F******, FZ-M1ECF***R (mk2) |
Download ▶ Released on February 15, 2018 Updated on August 28, 2018 |
FZ-Q2 |
FZ-Q2[F/G]****** (mk1) |
Download ▶ Released on February 27, 2018 Updated on August 28, 2018 |
3 |
CF-31 |
CF-31[1/2/3/4]****** (mk5) *1 |
Download ▶ Released on April 2, 2018 Updated on September 25, 2018 Only AMT user will be affected by this vulnerability. |
CF-54 |
CF-54[A/B/C]****** (mk1) |
CF-MX4 |
CF-MX4E***** (mk1) *2 |
CF-SX4 |
CF-SX4E***** (mk1) |
FZ-G1 |
FZ-G1[J/K/L/M/N]****** (mk3) *3 |
FZ-Y1 |
FZ-Y1[C/D]****** (mk2) |
4 |
CF-53 |
CF-53[2/3/4/5/7]****** (mk4) |
Download ▶ Released on April 25, 2018 Updated on October 30, 2018 Only AMT user will be affected by this vulnerability. |
CF-AX3 |
CF-AX3E***** (mk2) |
CF-C2 |
CF-C2[C/D]****** (mk2/mk2.5) |
CF-LX3 |
CF-LX3J***** (mk3) |
CF-LX3E***** (mk2) |
FZ-G1 |
FZ-G1F****** (mk2) |
FZ-M1 |
FZ-M1C****** (mk1) *8 |
FZ-Q1 |
FZ-Q1C****** (mk1) |
5 |
CF-19 |
CF-19Z****** (mk8) *4 |
Download ▶ Released on November 20, 2018 Only AMT user will be affected by this vulnerability. |
CF-19[5/6/8/9]****** (mk7) |
CF-19[0/1/2/3]****** (mk6) *5 |
CF-31 |
CF-31[W/X]****** (mk4) *6 |
CF-31[S/U]****** (mk3) *7 |
CF-52 |
CF-52V****** (mk5) |
CF-53 |
CF-53[S/T/U/V]****** (mk3) |
CF-53[J/K/M]****** (mk2) |
CF-AX2 |
CF-AX2L***** (mk1) |
CF-C2 |
CF-C2A****** (mk1) |
CF-D1 |
CF-D1G****** (mk2) |
CF-H2 |
CF-H2[P/Q/S]****** (mk3) |
CF-H2[F/G/H]****** (mk2) |
CF-SX2 |
CF-SX2J***** (mk1) |
FZ-G1 |
FZ-G1[A/B/C]****** (mk1) |
UT-MA6 |
UT-MA6****** (mk1) |
UT-MB5 |
UT-MB5****** (mk1) |
* If there is any error while updating this patch, please contact your regional field support engineer for further assistance.
Return to Top
|