Release Date: NOV 12, 2019

Build Details

Download Filename: ESXi670-201911001.zip
Build: 15018017
Download Size: 317.7 MB
md5sum: 8d3ef79c9275bc97f9ce081b70e901c6
sha1checksum: d600a201c03a945bf513c11a9360c230a1925598
Host Reboot Required: Yes
Virtual Machine Migration or Shutdown Required: Yes

Bulletins

Bulletin ID Category Severity
ESXi670-201911401-BG Bugfix Moderate
ESXi670-201911402-BG Bugfix Moderate

Rollup Bulletin

This rollup bulletin contains the latest VIBs with all the fixes since the initial release of ESXi 6.7.

Bulletin ID Category Severity
ESXi670-201911001 Bugfix Moderate

Image Profiles

VMware patch and update releases contain general and critical image profiles. Application of the general release image profile applies to new bug fixes.

Image Profile Name
ESXi-6.7.0-20191104001-standard
ESXi-6.7.0-20191104001-no-tools

For more information about the individual bulletins, see the Download Patches page and the Resolved Issues section.

Patch Download and Installation

The typical way to apply patches to ESXi hosts is through the VMware vSphere Update Manager. For details, see the About Installing and Administering VMware vSphere Update Manager.

You can update ESXi hosts by manually downloading the patch ZIP file from the VMware download page and installing the VIBs by using the esxcli software vib update command. Additionally, you can update the system by using the image profile and the esxcli software profile update command.

For more information, see the vSphere Command-Line Interface Concepts and Examples and the vSphere Upgrade Guide.

Resolved Issues

The resolved issues are grouped as follows.

ESXi670-201911401-BG
Patch Category Bugfix
Patch Severity Moderate
Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMware_bootbank_vsanhealth_6.7.0-3.77.14914425
  • VMware_bootbank_vsan_6.7.0-3.77.14914424
  • VMware_bootbank_esx-base_6.7.0-3.77.15018017
  • VMware_bootbank_esx-update_6.7.0-3.77.15018017
PRs Fixed  2439195, 2443456, 2439205
Related CVE numbers N/A

This patch updates the esx-base, esx-update, vsan and vsanhealth VIBs to resolve the following issues:

  • ESXi670-201911001 mitigates Machine Check Error on Page Size Change (MCEPSC), a speculative-execution vulnerability identified by CVE-2018-12207. This mitigation is not enabled by default. For more information, see section 3a of https://www.vmware.com/security/advisories/VMSA-2019-0020.html.

  • PR 2439195: Queries by using the CIM client or CLI to return an IPv4 VMkernel network endpoint fail

    If you make a query to the class VMware_KernelIPv4ProtocolEndpoint by using the CIM client or CLI, the query does not return VMkernel NIC instances. The issue is seen when IP ranges are 128.x.x.x and above.

    This issue is resolved in this release.

  • PR 2443456: After a fresh installation or upgrade to ESXi 6.7 Update 3, ESXi hosts might fail to boot in UEFI mode

    Due to incompatibility between the ESXi bootloader and the UEFI firmware on certain machines, after a fresh installation or upgrade to ESXi 6.7 Update 3, ESXi hosts might fail to boot in UEFI mode. You see similar messages appear in white and red on a black background:
    Shutting down firmware services...
    Page allocation error: Out of resources
    Failed to shutdown the boot services.
    Unrecoverable error

    If you upgrade to ESXi 6.7 Update 3 from a previous release and 6.7 Update 3 has never booted successfully, the failure causes ESXi Hypervisor Recovery to automatically roll back to the installation that you upgraded from. However, the machine still fails to boot because Hypervisor Recovery is unable to roll back the bootloader.

    This issue is resolved in this release.

  • PR 2439205: You see Sensor -1 type hardware health alarms on ESXi hosts and receive excessive mail alerts

    After upgrading to ESXi 6.7 Update 3, you might see Sensor -1 type hardware health alarms on ESXi hosts being triggered without an actual problem. This can result in excessive email alerts if you have configured email notifications for hardware sensor state alarms in your vCenter Server system. These mails might cause storage issues in the vCenter Server database if the Stats, Events, Alarms and Tasks (SEAT) directory goes above the 95% threshold.

    This issue is resolved in this release.

ESXi670-201911402-BG
Patch Category Bugfix
Patch Severity

Moderate

Host Reboot Required Yes
Virtual Machine Migration or Shutdown Required Yes
Affected Hardware N/A
Affected Software N/A
VIBs Included
  • VMware_bootbank_cpu-microcode_6.7.0-3.77.15018017
PRs Fixed  2432088
CVE numbers CVE-2018-12207, CVE-2019-11135
  • This patch updates the cpu-microcode VIB to resolve the following issues:
    • ESXi670-201911001 mitigates Machine Check Error on Page Size Change (MCEPSC), a speculative-execution vulnerability identified by CVE-2018-12207. This mitigation is not enabled by default. For more information, see section 3a of https://www.vmware.com/security/advisories/VMSA-2019-0020.html.
    • ESXi670-201911001 mitigates TSX Asynchronous Abort (TAA), a speculative-execution vulnerability identified by CVE-2019-11135. For more information, see section 3b of https://www.vmware.com/security/advisories/VMSA-2019-0020.html.
    • ESXi670-201911001 resolves a regression introduced in ESXi 6.7 Update 2, which causes the Hypervisor-Specific mitigations for L1TF and MDS vulnerabilities to be ineffective. For more information, see section 3a of https://www.vmware.com/security/advisories/VMSA-2019-0008.
    • ESXi670-201911001 contains a resolution to the Jump Conditional Code Erratum. For more information, see https://www.intel.com/content/www/us/en/support/articles/000055650/processors/intel-xeon-processors.html.
    • The cpu-microcode VIB includes the following Intel microcode:

      Code Name FMS Plt ID MCU Rev MCU Date Brand Names
      Nehalem EP 0x106a5 0x03 0x0000001d 5/11/2018 Intel Xeon 35xx Series
      Intel Xeon 55xx Series
      Lynnfield 0x106e5 0x13 0x0000000a 5/8/2018 Intel Xeon 34xx Lynnfield Series
      Clarkdale 0x20652 0x12 0x00000011 5/8/2018 Intel i3/i5 Clarkdale Series
      Intel Xeon 34xx Clarkdale Series
      Arrandale 0x20655 0x92 0x00000007 4/23/2018 Intel Core i7-620LE Processor
      Sandy Bridge DT 0x206a7 0x12 0x0000002f 2/17/2019 Intel Xeon E3-1100 Series
      Intel Xeon E3-1200 Series
      Intel i7-2655-LE Series
      Intel i3-2100 Series
      Westmere EP 0x206c2 0x03 0x0000001f 5/8/2018 Intel Xeon 56xx Series
      Intel Xeon 36xx Series
      Sandy Bridge EP 0x206d7 0x6d 0x00000718 5/21/2019 Intel Pentium 1400 Series
      Intel Xeon E5-1400 Series
      Intel Xeon E5-1600 Series
      Intel Xeon E5-2400 Series
      Intel Xeon E5-2600 Series
      Intel Xeon E5-4600 Series
      Nehalem EX 0x206e6 0x04 0x0000000d 5/15/2018 Intel Xeon 65xx Series
      Intel Xeon 75xx Series
      Westmere EX 0x206f2 0x05 0x0000003b 5/16/2018 Intel Xeon E7-8800 Series
      Intel Xeon E7-4800 Series
      Intel Xeon E7-2800 Series
      Ivy Bridge DT 0x306a9 0x12 0x00000021 2/13/2019 Intel i3-3200 Series
      Intel i7-3500-LE/UE
      Intel i7-3600-QE
      Intel Xeon E3-1200-v2 Series
      Intel Xeon E3-1100-C-v2 Series
      Intel Pentium B925C
      Haswell DT 0x306c3 0x32 0x00000027 2/26/2019 Intel Xeon E3-1200-v3 Series
      Intel i7-4700-EQ Series
      Intel i5-4500-TE Series
      Intel i3-4300 Series
      Ivy Bridge EP 0x306e4 0xed 0x0000042e 3/14/2019 Intel Xeon E5-4600-v2 Series
      Intel Xeon E5-2600-v2 Series
      Intel Xeon E5-2400-v2 Series
      Intel Xeon E5-1600-v2 Series
      Intel Xeon E5-1400-v2 Series
      Ivy Bridge EX 0x306e7 0xed 0x00000715 3/14/2019 Intel Xeon E7-8800/4800/2800-v2 Series
      Haswell EP 0x306f2 0x6f 0x00000043 3/1/2019 Intel Xeon E5-4600-v3 Series
      Intel Xeon E5-2600-v3 Series
      Intel Xeon E5-2400-v3 Series
      Intel Xeon E5-1600-v3 Series
      Intel Xeon E5-1400-v3 Series
      Haswell EX 0x306f4 0x80 0x00000016 6/17/2019 Intel Xeon E7-8800/4800-v3 Series
      Broadwell H 0x40671 0x22 0x00000021 6/13/2019 Intel Core i7-5700EQ
      Intel Xeon E3-1200-v4 Series
      Avoton 0x406d8 0x01 0x0000012d 9/16/2019 Intel Atom C2300 Series
      Intel Atom C2500 Series
      Intel Atom C2700 Series
      Broadwell EP/EX 0x406f1 0xef 0x0b000038 6/18/2019 Intel Xeon E7-8800/4800-v4 Series
      Intel Xeon E5-4600-v4 Series
      Intel Xeon E5-2600-v4 Series
      Intel Xeon E5-1600-v4 Series
      Skylake SP 0x50654 0xb7 0x02000065 9/5/2019 Intel Xeon Platinum 8100 Series
      Intel Xeon Gold 6100/5100, Silver 4100, Bronze 3100 Series
      Intel Xeon D-2100 Series
      Intel Xeon D-1600 Series
      Intel Xeon W-3100 Series
      Intel Xeon W-2100 Series
      Cascade Lake B-0 0x50656 0xbf 0x0400002c 9/5/2019 Intel Xeon Platinum 9200/8200 Series
      Intel Xeon Gold 6200/5200
      Intel Xeon Silver 4200/Bronze 3200
      Intel Xeon W-3200
      Cascade Lake 0x50657 0xbf 0x0500002c 9/5/2019 Intel Xeon Platinum 9200/8200 Series
      Intel Xeon Gold 6200/5200
      Intel Xeon Silver 4200/Bronze 3200
      Intel Xeon W-3200
      Broadwell DE 0x50662 0x10 0x0000001c 6/17/2019 Intel Xeon D-1500 Series
      Broadwell DE 0x50663 0x10 0x07000019 6/17/2019 Intel Xeon D-1500 Series
      Broadwell DE 0x50664 0x10 0x0f000017 6/17/2019 Intel Xeon D-1500 Series
      Broadwell NS 0x50665 0x10 0x0e00000f 6/17/2019 Intel Xeon D-1600 Series
      Skylake H/S 0x506e3 0x36 0x000000cc 4/1/2019 Intel Xeon E3-1500-v5 Series
      Intel Xeon E3-1200-v5 Series
      Denverton 0x506f1 0x01 0x0000002e 3/21/2019 Intel Atom C3000 Series
      Kaby Lake H/S/X 0x906e9 0x2a 0x000000c6 8/14/2019 Intel Xeon E3-1200-v6 Series
      Intel Xeon E3-1500-v6 Series
      Coffee Lake H/S 0x906ea 0x22 0x000000c6 8/14/2019 Intel Xeon E-2100 Series
      Coffee Lake H/S 0x906eb 0x02 0x000000c6 8/14/2019 Intel Xeon E-2100 Series
      Coffee Lake H/S 0x906ec 0x22 0x000000c6 8/14/2019 Intel Xeon E-2100 Series
      Coffee Lake Refresh 0x906ed 0x22 0x000000c6 8/14/2019 Intel Xeon E-2200 Series
ESXi-6.7.0-20191104001-standard
Profile Name ESXi-6.7.0-20191104001-standard
Build For build information, see the top of the page.
Vendor VMware, Inc.
Release Date November 12, 2019
Acceptance Level PartnerSupported
Affected Hardware N/A
Affected Software N/A
Affected VIBs
  • VMware_bootbank_vsanhealth_6.7.0-3.77.14914425
  • VMware_bootbank_vsan_6.7.0-3.77.14914424
  • VMware_bootbank_esx-base_6.7.0-3.77.15018017
  • VMware_bootbank_esx-update_6.7.0-3.77.15018017
  • VMware_bootbank_cpu-microcode_6.7.0-3.77.15018017
PRs Fixed 2443456, 2439195, 2439205, 2432088
Related CVE numbers CVE-2018-12207, CVE-2019-11135
  • This patch updates the following issues:
    • If you make a query to the class VMware_KernelIPv4ProtocolEndpoint by using the CIM client or CLI, the query does not return VMkernel NIC instances. The issue is seen when IP ranges are 128.x.x.x and above.

    • Due to incompatibility between the ESXi bootloader and the UEFI firmware on certain machines, after a fresh installation or upgrade to ESXi 6.7 Update 3, ESXi hosts might fail to boot in UEFI mode. You see similar messages appear in white and red on a black background:
      Shutting down firmware services...
      Page allocation error: Out of resources
      Failed to shutdown the boot services.
      Unrecoverable error

      If you upgrade to ESXi 6.7 Update 3 from a previous release and 6.7 Update 3 has never booted successfully, the failure causes ESXi Hypervisor Recovery to automatically roll back to the installation that you upgraded from. However, the machine still fails to boot because Hypervisor Recovery is unable to roll back the bootloader.

    • After upgrading to ESXi 6.7 Update 3, you might see Sensor -1 type hardware health alarms on ESXi hosts being triggered without an actual problem. This can result in excessive email alerts if you have configured email notifications for hardware sensor state alarms in your vCenter Server system. These mails might cause storage issues in the vCenter Server database if the Stats, Events, Alarms and Tasks (SEAT) directory goes above the 95% threshold.

    • ESXi670-201911001 mitigates Machine Check Error on Page Size Change (MCEPSC), a speculative-execution vulnerability identified by CVE-2018-12207. This mitigation is not enabled by default. For more information, see section 3a of https://www.vmware.com/security/advisories/VMSA-2019-0020.html.
    • ESXi670-201911001 mitigates TSX Asynchronous Abort (TAA), a speculative-execution vulnerability identified by CVE-2019-11135. For more information, see section 3b of https://www.vmware.com/security/advisories/VMSA-2019-0020.html.
    • ESXi670-201911001 resolves a regression introduced in ESXi 6.7 Update 2, which causes the Hypervisor-Specific mitigations for L1TF and MDS vulnerabilities to be ineffective. For more information, see section 3a of https://www.vmware.com/security/advisories/VMSA-2019-0008.
    • ESXi670-201911001 contains a resolution to the Jump Conditional Code Erratum. For more information, see https://www.intel.com/content/www/us/en/support/articles/000055650/processors/intel-xeon-processors.html.
    • The cpu-microcode VIB includes the following Intel microcode:

      Code Name FMS Plt ID MCU Rev MCU Date Brand Names
      Nehalem EP 0x106a5 0x03 0x0000001d 5/11/2018 Intel Xeon 35xx Series
      Intel Xeon 55xx Series
      Lynnfield 0x106e5 0x13 0x0000000a 5/8/2018 Intel Xeon 34xx Lynnfield Series
      Clarkdale 0x20652 0x12 0x00000011 5/8/2018 Intel i3/i5 Clarkdale Series
      Intel Xeon 34xx Clarkdale Series
      Arrandale 0x20655 0x92 0x00000007 4/23/2018 Intel Core i7-620LE Processor
      Sandy Bridge DT 0x206a7 0x12 0x0000002f 2/17/2019 Intel Xeon E3-1100 Series
      Intel Xeon E3-1200 Series
      Intel i7-2655-LE Series
      Intel i3-2100 Series
      Westmere EP 0x206c2 0x03 0x0000001f 5/8/2018 Intel Xeon 56xx Series
      Intel Xeon 36xx Series
      Sandy Bridge EP 0x206d7 0x6d 0x00000718 5/21/2019 Intel Pentium 1400 Series
      Intel Xeon E5-1400 Series
      Intel Xeon E5-1600 Series
      Intel Xeon E5-2400 Series
      Intel Xeon E5-2600 Series
      Intel Xeon E5-4600 Series
      Nehalem EX 0x206e6 0x04 0x0000000d 5/15/2018 Intel Xeon 65xx Series
      Intel Xeon 75xx Series
      Westmere EX 0x206f2 0x05 0x0000003b 5/16/2018 Intel Xeon E7-8800 Series
      Intel Xeon E7-4800 Series
      Intel Xeon E7-2800 Series
      Ivy Bridge DT 0x306a9 0x12 0x00000021 2/13/2019 Intel i3-3200 Series
      Intel i7-3500-LE/UE
      Intel i7-3600-QE
      Intel Xeon E3-1200-v2 Series
      Intel Xeon E3-1100-C-v2 Series
      Intel Pentium B925C
      Haswell DT 0x306c3 0x32 0x00000027 2/26/2019 Intel Xeon E3-1200-v3 Series
      Intel i7-4700-EQ Series
      Intel i5-4500-TE Series
      Intel i3-4300 Series
      Ivy Bridge EP 0x306e4 0xed 0x0000042e 3/14/2019 Intel Xeon E5-4600-v2 Series
      Intel Xeon E5-2600-v2 Series
      Intel Xeon E5-2400-v2 Series
      Intel Xeon E5-1600-v2 Series
      Intel Xeon E5-1400-v2 Series
      Ivy Bridge EX 0x306e7 0xed 0x00000715 3/14/2019 Intel Xeon E7-8800/4800/2800-v2 Series
      Haswell EP 0x306f2 0x6f 0x00000043 3/1/2019 Intel Xeon E5-4600-v3 Series
      Intel Xeon E5-2600-v3 Series
      Intel Xeon E5-2400-v3 Series
      Intel Xeon E5-1600-v3 Series
      Intel Xeon E5-1400-v3 Series
      Haswell EX 0x306f4 0x80 0x00000016 6/17/2019 Intel Xeon E7-8800/4800-v3 Series
      Broadwell H 0x40671 0x22 0x00000021 6/13/2019 Intel Core i7-5700EQ
      Intel Xeon E3-1200-v4 Series
      Avoton 0x406d8 0x01 0x0000012d 9/16/2019 Intel Atom C2300 Series
      Intel Atom C2500 Series
      Intel Atom C2700 Series
      Broadwell EP/EX 0x406f1 0xef 0x0b000038 6/18/2019 Intel Xeon E7-8800/4800-v4 Series
      Intel Xeon E5-4600-v4 Series
      Intel Xeon E5-2600-v4 Series
      Intel Xeon E5-1600-v4 Series
      Skylake SP 0x50654 0xb7 0x02000065 9/5/2019 Intel Xeon Platinum 8100 Series
      Intel Xeon Gold 6100/5100, Silver 4100, Bronze 3100 Series
      Intel Xeon D-2100 Series
      Intel Xeon D-1600 Series
      Intel Xeon W-3100 Series
      Intel Xeon W-2100 Series
      Cascade Lake B-0 0x50656 0xbf 0x0400002c 9/5/2019 Intel Xeon Platinum 9200/8200 Series
      Intel Xeon Gold 6200/5200
      Intel Xeon Silver 4200/Bronze 3200
      Intel Xeon W-3200
      Cascade Lake 0x50657 0xbf 0x0500002c 9/5/2019 Intel Xeon Platinum 9200/8200 Series
      Intel Xeon Gold 6200/5200
      Intel Xeon Silver 4200/Bronze 3200
      Intel Xeon W-3200
      Broadwell DE 0x50662 0x10 0x0000001c 6/17/2019 Intel Xeon D-1500 Series
      Broadwell DE 0x50663 0x10 0x07000019 6/17/2019 Intel Xeon D-1500 Series
      Broadwell DE 0x50664 0x10 0x0f000017 6/17/2019 Intel Xeon D-1500 Series
      Broadwell NS 0x50665 0x10 0x0e00000f 6/17/2019 Intel Xeon D-1600 Series
      Skylake H/S 0x506e3 0x36 0x000000cc 4/1/2019 Intel Xeon E3-1500-v5 Series
      Intel Xeon E3-1200-v5 Series
      Denverton 0x506f1 0x01 0x0000002e 3/21/2019 Intel Atom C3000 Series
      Kaby Lake H/S/X 0x906e9 0x2a 0x000000c6 8/14/2019 Intel Xeon E3-1200-v6 Series
      Intel Xeon E3-1500-v6 Series
      Coffee Lake H/S 0x906ea 0x22 0x000000c6 8/14/2019 Intel Xeon E-2100 Series
      Coffee Lake H/S 0x906eb 0x02 0x000000c6 8/14/2019 Intel Xeon E-2100 Series
      Coffee Lake H/S 0x906ec 0x22 0x000000c6 8/14/2019 Intel Xeon E-2100 Series
      Coffee Lake Refresh 0x906ed 0x22 0x000000c6 8/14/2019 Intel Xeon E-2200 Series
ESXi-6.7.0-20191104001-no-tools
Profile Name ESXi-6.7.0-20191104001-no-tools
Build For build information, see the top of the page.
Vendor VMware, Inc.
Release Date November 12, 2019
Acceptance Level PartnerSupported
Affected Hardware N/A
Affected Software N/A
Affected VIBs
  • VMware_bootbank_vsanhealth_6.7.0-3.77.14914425
  • VMware_bootbank_vsan_6.7.0-3.77.14914424
  • VMware_bootbank_esx-base_6.7.0-3.77.15018017
  • VMware_bootbank_esx-update_6.7.0-3.77.15018017
  • VMware_bootbank_cpu-microcode_6.7.0-3.77.15018017
PRs Fixed 2443456, 2439195, 2439205, 2432088
Related CVE numbers CVE-2018-12207, CVE-2019-11135
  • This patch updates the following issues:
    • If you make a query to the class VMware_KernelIPv4ProtocolEndpoint by using the CIM client or CLI, the query does not return VMkernel NIC instances. The issue is seen when IP ranges are 128.x.x.x and above.

    • Due to incompatibility between the ESXi bootloader and the UEFI firmware on certain machines, after a fresh installation or upgrade to ESXi 6.7 Update 3, ESXi hosts might fail to boot in UEFI mode. You see similar messages appear in white and red on a black background:
      Shutting down firmware services...
      Page allocation error: Out of resources
      Failed to shutdown the boot services.
      Unrecoverable error

      If you upgrade to ESXi 6.7 Update 3 from a previous release and 6.7 Update 3 has never booted successfully, the failure causes ESXi Hypervisor Recovery to automatically roll back to the installation that you upgraded from. However, the machine still fails to boot because Hypervisor Recovery is unable to roll back the bootloader.

    • After upgrading to ESXi 6.7 Update 3, you might see Sensor -1 type hardware health alarms on ESXi hosts being triggered without an actual problem. This can result in excessive email alerts if you have configured email notifications for hardware sensor state alarms in your vCenter Server system. These mails might cause storage issues in the vCenter Server database if the Stats, Events, Alarms and Tasks (SEAT) directory goes above the 95% threshold.

    • ESXi670-201911001 mitigates Machine Check Error on Page Size Change (MCEPSC), a speculative-execution vulnerability identified by CVE-2018-12207. This mitigation is not enabled by default. For more information, see section 3a of https://www.vmware.com/security/advisories/VMSA-2019-0020.html.
    • ESXi670-201911001 mitigates TSX Asynchronous Abort (TAA), a speculative-execution vulnerability identified by CVE-2019-11135. For more information, see section 3b of https://www.vmware.com/security/advisories/VMSA-2019-0020.html.
    • ESXi670-201911001 resolves a regression introduced in ESXi 6.7 Update 2, which causes the Hypervisor-Specific mitigations for L1TF and MDS vulnerabilities to be ineffective. For more information, see section 3a of https://www.vmware.com/security/advisories/VMSA-2019-0008.
    • ESXi670-201911001 contains a resolution to the Jump Conditional Code Erratum. For more information, see https://www.intel.com/content/www/us/en/support/articles/000055650/processors/intel-xeon-processors.html.
    • The cpu-microcode VIB includes the following Intel microcode:

      Code Name FMS Plt ID MCU Rev MCU Date Brand Names
      Nehalem EP 0x106a5 0x03 0x0000001d 5/11/2018 Intel Xeon 35xx Series
      Intel Xeon 55xx Series
      Lynnfield 0x106e5 0x13 0x0000000a 5/8/2018 Intel Xeon 34xx Lynnfield Series
      Clarkdale 0x20652 0x12 0x00000011 5/8/2018 Intel i3/i5 Clarkdale Series
      Intel Xeon 34xx Clarkdale Series
      Arrandale 0x20655 0x92 0x00000007 4/23/2018 Intel Core i7-620LE Processor
      Sandy Bridge DT 0x206a7 0x12 0x0000002f 2/17/2019 Intel Xeon E3-1100 Series
      Intel Xeon E3-1200 Series
      Intel i7-2655-LE Series
      Intel i3-2100 Series
      Westmere EP 0x206c2 0x03 0x0000001f 5/8/2018 Intel Xeon 56xx Series
      Intel Xeon 36xx Series
      Sandy Bridge EP 0x206d7 0x6d 0x00000718 5/21/2019 Intel Pentium 1400 Series
      Intel Xeon E5-1400 Series
      Intel Xeon E5-1600 Series
      Intel Xeon E5-2400 Series
      Intel Xeon E5-2600 Series
      Intel Xeon E5-4600 Series
      Nehalem EX 0x206e6 0x04 0x0000000d 5/15/2018 Intel Xeon 65xx Series
      Intel Xeon 75xx Series
      Westmere EX 0x206f2 0x05 0x0000003b 5/16/2018 Intel Xeon E7-8800 Series
      Intel Xeon E7-4800 Series
      Intel Xeon E7-2800 Series
      Ivy Bridge DT 0x306a9 0x12 0x00000021 2/13/2019 Intel i3-3200 Series
      Intel i7-3500-LE/UE
      Intel i7-3600-QE
      Intel Xeon E3-1200-v2 Series
      Intel Xeon E3-1100-C-v2 Series
      Intel Pentium B925C
      Haswell DT 0x306c3 0x32 0x00000027 2/26/2019 Intel Xeon E3-1200-v3 Series
      Intel i7-4700-EQ Series
      Intel i5-4500-TE Series
      Intel i3-4300 Series
      Ivy Bridge EP 0x306e4 0xed 0x0000042e 3/14/2019 Intel Xeon E5-4600-v2 Series
      Intel Xeon E5-2600-v2 Series
      Intel Xeon E5-2400-v2 Series
      Intel Xeon E5-1600-v2 Series
      Intel Xeon E5-1400-v2 Series
      Ivy Bridge EX 0x306e7 0xed 0x00000715 3/14/2019 Intel Xeon E7-8800/4800/2800-v2 Series
      Haswell EP 0x306f2 0x6f 0x00000043 3/1/2019 Intel Xeon E5-4600-v3 Series
      Intel Xeon E5-2600-v3 Series
      Intel Xeon E5-2400-v3 Series
      Intel Xeon E5-1600-v3 Series
      Intel Xeon E5-1400-v3 Series
      Haswell EX 0x306f4 0x80 0x00000016 6/17/2019 Intel Xeon E7-8800/4800-v3 Series
      Broadwell H 0x40671 0x22 0x00000021 6/13/2019 Intel Core i7-5700EQ
      Intel Xeon E3-1200-v4 Series
      Avoton 0x406d8 0x01 0x0000012d 9/16/2019 Intel Atom C2300 Series
      Intel Atom C2500 Series
      Intel Atom C2700 Series
      Broadwell EP/EX 0x406f1 0xef 0x0b000038 6/18/2019 Intel Xeon E7-8800/4800-v4 Series
      Intel Xeon E5-4600-v4 Series
      Intel Xeon E5-2600-v4 Series
      Intel Xeon E5-1600-v4 Series
      Skylake SP 0x50654 0xb7 0x02000065 9/5/2019 Intel Xeon Platinum 8100 Series
      Intel Xeon Gold 6100/5100, Silver 4100, Bronze 3100 Series
      Intel Xeon D-2100 Series
      Intel Xeon D-1600 Series
      Intel Xeon W-3100 Series
      Intel Xeon W-2100 Series
      Cascade Lake B-0 0x50656 0xbf 0x0400002c 9/5/2019 Intel Xeon Platinum 9200/8200 Series
      Intel Xeon Gold 6200/5200
      Intel Xeon Silver 4200/Bronze 3200
      Intel Xeon W-3200
      Cascade Lake 0x50657 0xbf 0x0500002c 9/5/2019 Intel Xeon Platinum 9200/8200 Series
      Intel Xeon Gold 6200/5200
      Intel Xeon Silver 4200/Bronze 3200
      Intel Xeon W-3200
      Broadwell DE 0x50662 0x10 0x0000001c 6/17/2019 Intel Xeon D-1500 Series
      Broadwell DE 0x50663 0x10 0x07000019 6/17/2019 Intel Xeon D-1500 Series
      Broadwell DE 0x50664 0x10 0x0f000017 6/17/2019 Intel Xeon D-1500 Series
      Broadwell NS 0x50665 0x10 0x0e00000f 6/17/2019 Intel Xeon D-1600 Series
      Skylake H/S 0x506e3 0x36 0x000000cc 4/1/2019 Intel Xeon E3-1500-v5 Series
      Intel Xeon E3-1200-v5 Series
      Denverton 0x506f1 0x01 0x0000002e 3/21/2019 Intel Atom C3000 Series
      Kaby Lake H/S/X 0x906e9 0x2a 0x000000c6 8/14/2019 Intel Xeon E3-1200-v6 Series
      Intel Xeon E3-1500-v6 Series
      Coffee Lake H/S 0x906ea 0x22 0x000000c6 8/14/2019 Intel Xeon E-2100 Series
      Coffee Lake H/S 0x906eb 0x02 0x000000c6 8/14/2019 Intel Xeon E-2100 Series
      Coffee Lake H/S 0x906ec 0x22 0x000000c6 8/14/2019 Intel Xeon E-2100 Series
      Coffee Lake Refresh 0x906ed 0x22 0x000000c6 8/14/2019 Intel Xeon E-2200 Series
check-circle-line exclamation-circle-line close-line
Scroll to top icon