RM Logo
Technical Rating: 
Support Home PageSupport
Print This PagePrint This Page
Add to 'My Library' Add to 'My Library'

BIOS and firmware updates for security vulnerabilities
Published Date : 18 Jan 2018   Last Updated : 04 Oct 2024   Content Ref: TEC6039891  





Symptoms

BIOS and firmware updates for security vulnerabilities

Due to the recent increase in the number of security vulnerabilities being published (e.g., Meltdown & Spectre) and the attention that these are being given, it is more important than ever that your system firmware and BIOS are regularly updated to ensure that the latest security fixes and mitigations have been applied.

To simplify this, we have collated the tables of resources below, which provide specific links for client and server systems that we have sold.

We recommend that you check for updates regularly and implement any updates as part of your regular maintenance window.
We advise that you perform some due diligence before rolling out BIOS or firmware updates to your estate of computers and follow the below guidelines:

  • Patch a small sample and test these for performance and stability first.
  • Wait two weeks once an update has been released before rolling out (during which the time you can complete the due diligence testing mentioned above), as previously early BIOS and firmware updates have shown some performance issues.
  • However, ensure that you have a plan ready to apply the upgrade immediately should the urgency change.
  • If you are buying new hardware, then please check that the system has the latest BIOS and firmware installed before adding to your network.
  • It is essential that you ensure you follow all of the hardware suppliers' recommendations when updating the system BIOS or firmware.
  • It is recommended that if BitLocker is enabled on your computer, you suspend it prior to running a BIOS / UEFI update. Once the computer has rebooted after the update, please enable BitLocker.
  • The original equipment manufacturer (OEM) has provided a BIOS update that you can find here. These updates will remove RM branding from splash and BIOS screens for RM computers. They may also reset any custom settings which you have applied, please ensure these settings are still present after any update and re-apply where necessary.


Procedure

Manufacturer security updates

The manufacturer provides a publically available consolidated list of security updates, a link to this is provided in the following table:

Manufacturer

Website

Lenovo https://support.lenovo.com/gb/en/product_security/home
HPi https://support.hp.com/us-en/topic/security-bulletin-archive   
HPe Security Bulletin Library | HPE Support
Dynabook (previously Toshiba)  https://uk.dynabook.com/support/businesslaptops/
Aruba http://www.arubanetworks.com/support-services/security-bulletins/
Ruckus https://www.ruckuswireless.com/security
Fortinet https://fortiguard.com/psirt


Manufacturer links

The links in the below table are for manufacturers websites where the latest BIOS and firmware updates can be downloaded. Some sites will require a log in account and valid support contract.

Manufacturer Website
Lenovo https://support.lenovo.com/us/en
HPi https://support.hp.com/gb-en/drivers
Dell https://www.dell.com/support/home/uk/en/ukbsdt1?app=drivers
Dynabook (previously Toshiba)

https://uk.dynabook.com/support/drivers/laptops/

HPe / Aruba networking 

https://h10145.www1.hpe.com/downloads/ProductsList.aspx?smp=1
HPe Servers Home | HPE Support
Ruckus https://support.ruckuswireless.com/software
Fortinet https://support.fortinet.com/


RM products

FEEDBACK
Did the information in this article help answer your question?
 Yes
 No
Please add any comments about this article in the box below. If you answered No then it is important you tell us why so that we can change the article if required. We can only respond if you log in to the RM Support website or provide your contact details. Note: If you need help with a technical query, please log a call online or telephone our support team.
Thank you for your feedback, which is sent directly to the RM Knowledge team. We address every message received with the intention of improving our Knowledge Library articles. If you have an unresolved technical issue, please contact RM Support.


If this article has not helped provide a solution then it is also possible to log a call...



Document Keywords: meltdown, spectre, firmware, update, vulnerability, TEC6039891


Please read - important disclaimer information.
http://www.rm.com/_RMVirtual/Includes/csredirect.asp?cref=&title=Standard Content Disclaimer


Top Of PageTop of page