42437members
279online
148347posts
BIOS updates concerning the Meltdown / Spectre vulnerability for MEDION Notebooks
MEDION Notebooks (Update: 23.05.2018)
MEDION Notebooks (Intel) | |||||
MEDION Naming | Microcode update version | BIOS version | MEDION Download | Info | |
E7425/26 | 00000084 | 208 | Download | BIOS: Released (23.05.2018) Security hole "Spectre 2" fixed by KB4090007 (V1.003) |
|
P7649/50 | |||||
P7651/52 | |||||
P7653/54 | |||||
E6439/40 | 00000084 | 207 | Download | BIOS: Released (22.03.2018) Security hole "Spectre 2" fixed by KB4090007 (V1.003) |
|
P6687/88 | |||||
S6425/26 | |||||
S6625/26 | |||||
P6681/82 | 00000084 | 212 | Download | BIOS: Released (22.03.2018) Security hole "Spectre 2" fixed by KB4090007 (V1.003) |
|
S3409/10 | 00000084 | 220 | Download | BIOS: Released (16.03.2018) Security hole "Spectre 2" fixed by KB4090007 (V1.003) |
|
S3411/12 | |||||
E6435/36 | 00000084 | 212 | Download | BIOS: Released (17.05.2018) Security hole "Spectre 2" fixed by KB4090007 (V1.003) |
|
P6401/02 | |||||
P6677/78 | |||||
E6437/38 | 00000084 | 209 | Download | BIOS: Released (17.05.2018) Security hole "Spectre 2" fixed by KB4090007 (V1.003) |
|
S6423/24 | |||||
E7423/24 | 00000084 | 211 | Download | BIOS: Released (17.05.2018) Security hole "Spectre 2" fixed by KB4090007 (V1.003) |
|
P7401/02 | |||||
P7645/46 | |||||
P7647/48 | |||||
P6679/80 | 00000084 | 211 | Download | BIOS: Released (16.04.2018) Security hole "Spectre 2" fixed by KB4090007 (V1.003) |
|
E6421/22 | 000000C2 | 222 | Download | BIOS: Released (26.04.2018) Security hole "Spectre 2" fixed by KB4090007 (V1.001) |
|
E6423/24 | |||||
P6659/60 | |||||
P6661/62 | |||||
P6667/68 | |||||
E6429/30 | 000000C2 | 209 | Download | BIOS: Released (17.05.2018) Security hole "Spectre 2" fixed by KB4090007 (V1.001) |
|
E6431/32 | |||||
P6669/70 | |||||
P6671/72 | |||||
E7419/20 | 000000C2 | 222 | Download | BIOS: Released (26.04.2018) Security hole "Spectre 2" fixed by KB4090007 (V1.001) |
|
E7421/22 | |||||
P7641/42 | |||||
P7643/44 | |||||
S6619 | 000000C2 | requested | BIOS: Testing Security hole "Spectre 2" fixed by KB4090007 (V1.001) |
||
S6419 | |||||
S2401 | 00000084 | N1OET75M | BIOS: Testing Security hole "Spectre 2" fixed by KB4090007 (V1.003) |
||
E2215T/16T | 367 | requested | |||
E2217T/18T | |||||
E2221T/22T | |||||
E2228T/25T | |||||
E4241/42 | 367 | requested | |||
E3213/14 | 0000002E | requested | |||
E3215/16 | |||||
P3403T/04T | 000000C2 | requested | |||
E8201T | TBD | requested | |||
S6421/22 | 000000C2 | 107 | BIOS: Testing Security hole "Spectre 2" fixed by KB4090007 (V1.001) |
||
S4219/20 | 000000410 | N.1.57 | Download | BIOS: Released (08.03.2018) | |
S6219/20 | |||||
E2211T/12T | TBD | requested | |||
P9211T | TBD | requested | |||
P1211T | |||||
E4213/14 | TBD | requested | |||
E1239T/40T | 367 | requested | |||
P3401T/02T | 000000C2 | requested | BIOS: Requested Security hole "Spectre 2" fixed by KB4090007 (V1.001) |
||
X7841 | 000000C2 | 1.05.18RME1 | Download | BIOS: Released (06.03.2018) Security hole "Spectre 2" fixed by KB4090007 (V1.001) |
|
X7842 | |||||
X7843 | |||||
X7845 | 000000C2 | 1.05.18RGME1 | BIOS: Testing Security hole "Spectre 2" fixed by KB4090007 (V1.001) |
||
X7847 | 000000C2 | 1.05.08RME3 | BIOS: Testing Security hole "Spectre 2" fixed by KB4090007 (V1.001) |
||
X7849 | 000000C2 | 1.05.08RME6 | BIOS: Testing Security hole "Spectre 2" fixed by KB4090007 (V1.001) |
||
X6601 | 000000C2 | 1.05.05RME1 | BIOS: Testing Security hole "Spectre 2" fixed by KB4090007 (V1.001) |
||
X7851 | 00000084 | 1.05.04RGME1 | BIOS: Testing Security hole "Spectre 2" fixed by KB4090007 (V1.003) |
||
X7853 | |||||
X7855 | 00000084 | 1.05.08RGME2 | BIOS: Testing Security hole "Spectre 2" fixed by KB4090007 (V1.003) |
||
X7857 | |||||
X6603 | 00000084 | MDCN17WW | BIOS: Testing Security hole "Spectre 2" fixed by KB4090007 (V1.003) |
||
requested | The BIOS is requested from our partners |
Testing | BIOS available, currently tested by MEDION |
The information in this article refers to:
Review Date: 2019-07-01
Intel has published an update on its Security Center website
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
INTEL-SA-00088: (Revision 1.6 | 22-January-2018)
Recommendations:
Updated Jan. 22
We have now identified the root cause of the reboot issue impacting Broadwell and Haswell platforms, and made good progress in developing a solution to address it. Based on this, we are updating our guidance for customers and partners:
We believe it is important for OEMs and our customers to follow this guidance for all of the specified platforms listed below, as they may demonstrate higher than expected reboots and unpredictable system behavior.
- We recommend that OEMs, Cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions on the below platforms, as they may introduce higher than expected reboots and other unpredictable system behavior.
- We also ask that our industry partners focus efforts on testing early versions of the updated solution for Broadwell and Haswell we started rolling out this weekend, so we can accelerate its release. We expect to share more details on timing later this week.
- For those concerned about system stability while we finalize the updated solutions, we are also working with our OEM partners on the option to utilize a previous version of microcode that does not display these issues, but removes the Variant 2 (Spectre) mitigations. This would be delivered via a BIOS update, and would not impact mitigations for Variant 1 (Spectre) and Variant 3 (Meltdown).
The progress we have made in identifying a root cause for Haswell and Broadwell will help us address issues on other platforms. Please be assured we are working quickly to address these issues.
We follow Intel's recommendation and have stopped providing up-to-date versions!