cancel
Showing results for 
Search instead for 
Did you mean: 

BIOS updates concerning the Meltdown / Sprectre vulnerability for MEDION Notebooks

BIOS updates concerning the Meltdown / Sprectre vulnerability for MEDION Notebooks

 

MEDION Notebooks (Update: 23.01.2018)
! We have stopped providing up-to-date versions, see comment below !)
MEDION Notebooks (Intel)
MEDION Naming Microcode update version BIOS version MEDION Download Info
E7425/26 00000080 206   Testing
P7649/50
P7651/52
P7653/54
 
E6439/40 00000080 204   Testing
P6687/88
S6425/26
S6625/26
 
P6681/82 00000080 211   Testing
 
S3409/10 00000080 requested    
S3411/12
 
E6435/36 00000080 211   Testing
P6401/02
P6677/78
 
E6437/38 00000080 208   Testing
S6423/24
 
E7423/24 00000080 requested    
P7401/02
P7645/46
P7647/48
 
P6679/80 00000080 requested    
 
E6421/22 000000C2 requested    
E6423/24
P6659/60
P6661/62
P6667/68
 
E6429/30 000000C2 requested    
E6431/32
P6669/70
P6671/72
 
E7419/20 000000C2 requested    
E7421/22
P7641/42
P7643/44
 
S6619 000000C2 requested    
S6419
 
S2401 00000080 N1OET75M   Testing
 
E6433/34 000000C2 108   Testing
E6425/26
E6427/28
P6663/64
P6665/66
P6403/04
P6673/74
P6675/76
 
E2215T/16T 367 requested    
E2217T/18T
E2221T/22T
E2228T/25T
 
E4241/42 367 requested    
 
E3213/14 0000002E requested    
E3215/16
 
P3403T/04T 000000C2 requested    
 
E8201T TBD requested    
 
S6421/22 000000C2 requested    
 
S4219/20 TBD requested    
S6219/20
 
E2211T/12T TBD requested    
 
P9211T TBD requested    
P1211T
 
E4213/14 TBD requested    
 
E1239T/40T 367 requested    
 
P3401T/02T 000000C2 requested    
 
X7841 000000C2 requested    
X7842
X7843
 
X7845 000000C2 requested    
 
X7847 000000C2 requested    
 
X7849 000000C2 requested    
 
X6601 000000C2 requested    
 
X7851 00000080 requested    
X7853
 
X7855 00000080 1.05.07RGME2   Testing
X7857
 
X6603 00000080 MDCN15WW   Testing
 

* Notes 
requested The BIOS is requested from our partners
Testing BIOS available, currently tested by MEDION

 

Version History
Revision #
4 of 4
Last update:
‎23.01.2018 12:21
Updated by:
Community Manager
 
Contributors
Comments

We have stopped providing up-to-date versions

Intel has published an update on its Security Center website
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr


INTEL-SA-00088: (Revision 1.6 | 22-January-2018)
Recommendations:
Updated Jan. 22
We have now identified the root cause of the reboot issue impacting Broadwell and Haswell platforms, and made good progress in developing a solution to address it. Based on this, we are updating our guidance for customers and partners:
  • We recommend that OEMs, Cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions on the below platforms, as they may introduce higher than expected reboots and other unpredictable system behavior.
  • We also ask that our industry partners focus efforts on testing early versions of the updated solution for Broadwell and Haswell we started rolling out this weekend, so we can accelerate its release. We expect to share more details on timing later this week.
  • For those concerned about system stability while we finalize the updated solutions, we are also working with our OEM partners on the option to utilize a previous version of microcode that does not display these issues, but removes the Variant 2 (Spectre) mitigations. This would be delivered via a BIOS update, and would not impact mitigations for Variant 1 (Spectre) and Variant 3 (Meltdown).
We believe it is important for OEMs and our customers to follow this guidance for all of the specified platforms listed below, as they may demonstrate higher than expected  reboots and unpredictable system behavior. 
The progress we have made in identifying a root cause for Haswell and Broadwell will help us address issues on other platforms. Please be assured we are working quickly to address these issues.
 

We follow Intel's recommendation and have stopped providing up-to-date versions!