About countermeasure to Wi-Fi WPA2
(Wi-Fi Protected Access II) vulnerability problem

Release Date: Nov 21, 2017
Updated: Nov 20, 2018

The Wi-Fi WPA2 (Wi-Fi Protected Access II) vulnerability information has been published.
We will show the information below.
Please be advised that the information will be changed or added without notice.

Content of countermeasure

Panasonic Windows OS-equipped model (except FZ-E1 / FZ-F1).

Microsoft has been informed of countermeasure to vulnerability.
Please apply the update program to the following target OS according to the guidance of Microsoft Corporation.

Microsoft site


[target OS]
Windows 7 SP1, Windows 8.1, Windows 10(Version1709 is not applicable)

Target model OS Countermeasure module
CF-LX6Y (mk3)
CF-SZ6R Asia-model (mk2)
CF-XZ6R (mk1)
Windows 10
Download
Released on December 19, 2017
CF-MX4E (mk1)
CF-SX4E Asia-model (mk1)
Windows 10
Download
Released on December 19, 2017
Windows 8.1
Download
Released on March 19, 2018
Updated on July 31, 2018
Windows 7
Download
Released on February 13, 2018
Updated on September 4, 2018
CF-AX3E (mk2)
CF-LX3E (mk2)
CF-LX3J (mk3)
Windows 10
Download
Released on December 19, 2017
Windows 8.1
Download
Released on March 19, 2018
Updated on July 31, 2018
Windows 7
Download
Released on February 13, 2018
CF-20[A/B/C/D] (mk1) Windows 10
Download
Released on December 19, 2017
Windows 7
Download
Released on February 13, 2018
Updated on September 4, 2018
CF-33[A/B/C/L/M/N/V/W] (mk1)
CF-54[G/H/J] (mk3)
FZ-M1[D/ECD] (mk2)
Windows 10
Download
Released on December 19, 2017
CF-33[D/E/P/Q] (mk1)
CF-54[D/E/F] (mk2)
CF-54[G/H/J] (mk3)
CF-D1[N/Q] (mk3)
FZ-G1[P/Q/R/S/T] (mk4)
FZ-M1[ECF/F] (mk2)
FZ-Q2[F/G] (mk1)
FZ-Y1D (mk2)
Windows 10
Download
Released on December 19, 2017
Windows 7
Download
Released on February 13, 2018
Updated on September 4, 2018
CF-31[1/2/3/4] (mk5)
CF-54[A/B/C] (mk1)
FZ-G1[J/K/L/M/N] (mk3)
FZ-Y1C (mk2)
Windows 10
Download
Released on December 19, 2017
Windows 8.1
Download
Released on March 19, 2018
Updated on July 31, 2018
Windows 7
Download
Released on February 13, 2018
Updated on September 4, 2018
FZ-M1A (mk1)
FZ-R1[A/F] (mk1)
FZ-Q1A (mk1)
Windows 10
Download
Released on December 19, 2017
Windows 8.1
Download
Released on March 19, 2018
Updated on July 31, 2018
CF-53[2/3/4/5/7] (mk4)
CF-C2C (mk2/mk2.5)
FZ-G1F (mk2)
FZ-M1C (mk1)
FZ-Q1C (mk1)
Windows 10
Download
Released on December 19, 2017
Windows 8.1
Download
Released on March 19, 2018
Updated on July 31, 2018
Windows 7
Download
Released on February 13, 2018
CF-19[0/1/2/3] (mk6)
CF-19[5/6/8/9] (mk7)
CF-19Z (mk8)
CF-31[S/U/V] (mk3)
CF-31[W/X/Y] (mk4)
CF-53[J/M] (mk2)
CF-53S (mk3)
CF-AX2L (mk1)
CF-C2A (mk1)
CF-D1[G/K] (mk2)
CF-H2[F/G/H] (mk2)
CF-H2[P/Q/S] (mk3)
CF-SX2J (mk1)
FZ-G1[A/B/C] (mk1)
UT-MA6 (mk1)
UT-MB5 (mk1)
Windows 10
Windows 8.1
Windows 7
There is no release of countermeasure module.
Please confirm Note-1 below.


∗Note-1 : For models of "no release", please take the following countermeasures.

• Countermeasure 1:

Please apply the update program according to the contents of the above "[1] OS".

• Countermeasure 2:

There is an effect of vulnerability only when WoWLAN is enabled. (Wake on Wireless LAN : function to resume from sleep state by wireless LAN) This function is disabled at the time of shipment and will not be enabled unless you change the setting. [Method of Confirming Setting of WoWLAN]

  1. Open [Device Manager], open [Network adapters], right click [Intel(R) **** 8265 (or 8260/7265/7260/6250/6235/6205)], click [Properties].
  2. Click [Power Management] tab.
  3. WoWLAN is enabled if there is a second check from the top, or if there is also a third check.
  4. To disable the WoWLAN settings, uncheck the second check from the top and click [OK].
(Note)
If [Intel® Smart Connect Technology] is displayed in the task tray for your PC, Even if WoWLAN is enabled by the above confirmation method, there is no effect of vulnerability.


It affects only when using the Intel® Active Management Technology (AMT) function via wireless LAN.
This function is disabled at the time of shipment and it will not be enabled unless you change the BIOS setting.

Countermeasure module was released in some models.

Group Target model OS Countermeasure module
1 CF-33 CF-33[A/B/C/L/M/N/V/W]****** (mk1)
Download
Released on March 9, 2018
Updated on July 10, 2018
CF-54 CF-54[G/H/J]****** (mk3)
Download
Released on March 9, 2018
Updated on July 10, 2018
CF-LX6 CF-LX6YDAZTM (mk3)
Download
Released on March 9, 2018
Updated on July 10, 2018
CF-SZ6 CF-SZ6R***** (mk2)
Download
Released on March 9, 2018
Updated on July 10, 2018
CF-XZ6 CF-XZ6R***** (mk1)
Download
Released on March 9, 2018
Updated on July 10, 2018
2 CF-20 CF-20[A/B/C/D]****** (mk1)
Download
Released on February 15, 2018
Updated on August 28, 2018
CF-33 CF-33[D/E/P/Q]****** (mk1)
Download
Released on February 15, 2018
Updated on August 28, 2018
CF-54 CF-54[D/E/F]****** (mk2)
Download
Released on February 15, 2018
Updated on August 28, 2018
CF-D1 CF-D1[N/Q]****** (mk3)
Download
Released on February 15, 2018
Updated on August 28, 2018
FZ-G1 FZ-G1[P/Q/R]****** (mk4)
Download
Released on February 15, 2018
Updated on August 28, 2018
FZ-M1 FZ-M1F******, FZ-M1ECF***R (mk2)
Download
Released on February 15, 2018
Updated on August 28, 2018
FZ-Q2 FZ-Q2[F/G]****** (mk1)
Download
Released on February 27, 2018
Updated on August 28, 2018
3 CF-31 CF-31[1/2/3/4]****** (mk5) *1
Download
Released on April 2, 2018
Updated on September 25, 2018

Only AMT user will be affected by this vulnerability.
CF-54 CF-54[A/B/C]****** (mk1)
CF-MX4 CF-MX4E***** (mk1) *2
CF-SX4 CF-SX4E***** (mk1)
FZ-G1 FZ-G1[J/K/L/M/N]****** (mk3) *3
FZ-Y1 FZ-Y1[C/D]****** (mk2)
4 CF-53 CF-53[2/3/4/5/7]****** (mk4)
Download
Released on April 25, 2018
Updated on October 30, 2018

Only AMT user will be affected by this vulnerability.
CF-AX3 CF-AX3E***** (mk2)
CF-C2 CF-C2[C/D]****** (mk2/mk2.5)
CF-LX3 CF-LX3J***** (mk3)
CF-LX3E***** (mk2)
FZ-G1 FZ-G1F****** (mk2)
FZ-M1 FZ-M1C****** (mk1) *8
FZ-Q1 FZ-Q1C****** (mk1)
5 CF-19 CF-19Z****** (mk8) *4
Download
Released on November 20, 2018
Only AMT user will be affected by this vulnerability.
CF-19[5/6/8/9]****** (mk7)
CF-19[0/1/2/3]****** (mk6) *5
CF-31 CF-31[W/X]****** (mk4) *6
CF-31[S/U]****** (mk3) *7
CF-52 CF-52V****** (mk5)
CF-53 CF-53[S/T/U/V]****** (mk3)
CF-53[J/K/M]****** (mk2)
CF-AX2 CF-AX2L***** (mk1)
CF-C2 CF-C2A****** (mk1)
CF-D1 CF-D1G****** (mk2)
CF-H2 CF-H2[P/Q/S]****** (mk3)
CF-H2[F/G/H]****** (mk2)
CF-SX2 CF-SX2J***** (mk1)
FZ-G1 FZ-G1[A/B/C]****** (mk1)
UT-MA6 UT-MA6****** (mk1)
UT-MB5 UT-MB5****** (mk1)