cancel
Showing results for 
Search instead for 
Did you mean: 

BIOS updates concerning the Meltdown / Spectre vulnerability for MEDION Notebooks

BIOS updates concerning the Meltdown / Spectre vulnerability for MEDION Notebooks

 

MEDION Notebooks (Update: 23.05.2018)
  • Security hole "Spectre 1, Bounds Check Bypass (CVE-2017-5753)" fixed by KB4056568
  • Security hole "Spectre 2, Branch Target Injection (CVE 2017-5715)" see Table below
  • Security hole "Meltdown, Rogue Data Cache Load (CVE-2017-5754)" fixed by KB4056568
 
MEDION Notebooks (Intel)
MEDION Naming Microcode update version BIOS version MEDION Download Info
E7425/26 00000084 208 Download BIOS: Released (23.05.2018)
Security hole "Spectre 2" fixed by KB4090007 (V1.003)
P7649/50
P7651/52
P7653/54
 
E6439/40 00000084 207 Download BIOS: Released (22.03.2018)
Security hole "Spectre 2" fixed by KB4090007 (V1.003)
P6687/88
S6425/26
S6625/26
 
P6681/82 00000084 212 Download BIOS: Released (22.03.2018)
Security hole "Spectre 2" fixed by KB4090007 (V1.003)
 
S3409/10 00000084 220 Download BIOS: Released (16.03.2018)
Security hole "Spectre 2" fixed by KB4090007 (V1.003)
S3411/12
 
E6435/36 00000084 212 Download BIOS: Released (17.05.2018)
Security hole "Spectre 2" fixed by KB4090007 (V1.003)
P6401/02
P6677/78
 
E6437/38 00000084 209 Download BIOS: Released (17.05.2018)
Security hole "Spectre 2" fixed by KB4090007 (V1.003)
S6423/24
 
E7423/24 00000084 211 Download BIOS: Released (17.05.2018)
Security hole "Spectre 2" fixed by KB4090007 (V1.003)
P7401/02
P7645/46
P7647/48
 
P6679/80 00000084 211 Download BIOS: Released (16.04.2018)
Security hole "Spectre 2" fixed by KB4090007 (V1.003)
 
E6421/22 000000C2 222 Download BIOS: Released (26.04.2018)
Security hole "Spectre 2" fixed by KB4090007 (V1.001)
E6423/24
P6659/60
P6661/62
P6667/68
 
E6429/30 000000C2 209 Download BIOS: Released (17.05.2018)
Security hole "Spectre 2" fixed by KB4090007 (V1.001)
E6431/32
P6669/70
P6671/72
 
E7419/20 000000C2 222 Download BIOS: Released (26.04.2018)
Security hole "Spectre 2" fixed by KB4090007 (V1.001)
E7421/22
P7641/42
P7643/44
 
S6619 000000C2 requested   BIOS: Testing
Security hole "Spectre 2" fixed by KB4090007 (V1.001)
S6419
 
S2401 00000084 N1OET75M   BIOS: Testing
Security hole "Spectre 2" fixed by KB4090007 (V1.003)
 
E2215T/16T 367 requested    
E2217T/18T
E2221T/22T
E2228T/25T
 
E4241/42 367 requested    
 
E3213/14 0000002E requested    
E3215/16
 
P3403T/04T 000000C2 requested    
 
E8201T TBD requested    
 
S6421/22 000000C2 107   BIOS: Testing
Security hole "Spectre 2" fixed by KB4090007 (V1.001)
 
S4219/20 000000410 N.1.57 Download BIOS: Released (08.03.2018)
S6219/20
 
E2211T/12T TBD requested    
 
P9211T TBD requested    
P1211T
 
E4213/14 TBD requested    
 
E1239T/40T 367 requested    
 
P3401T/02T 000000C2 requested   BIOS: Requested
Security hole "Spectre 2" fixed by KB4090007 (V1.001)
 
X7841 000000C2 1.05.18RME1 Download BIOS: Released (06.03.2018)
Security hole "Spectre 2" fixed by KB4090007 (V1.001)
X7842
X7843
 
X7845 000000C2 1.05.18RGME1   BIOS: Testing
Security hole "Spectre 2" fixed by KB4090007 (V1.001)
 
X7847 000000C2 1.05.08RME3   BIOS: Testing
Security hole "Spectre 2" fixed by KB4090007 (V1.001)
 
X7849 000000C2 1.05.08RME6   BIOS: Testing
Security hole "Spectre 2" fixed by KB4090007 (V1.001)
 
X6601 000000C2 1.05.05RME1   BIOS: Testing
Security hole "Spectre 2" fixed by KB4090007 (V1.001)
 
X7851 00000084 1.05.04RGME1   BIOS: Testing
Security hole "Spectre 2" fixed by KB4090007 (V1.003)
X7853
 
X7855 00000084 1.05.08RGME2   BIOS: Testing
Security hole "Spectre 2" fixed by KB4090007 (V1.003)
X7857
 
X6603 00000084 MDCN17WW   BIOS: Testing
Security hole "Spectre 2" fixed by KB4090007 (V1.003)
 

* Notes 
requested The BIOS is requested from our partners
Testing BIOS available, currently tested by MEDION

 


Version history
Last update:
‎28.05.2019 12:40
Updated by:
Community Manager
Contributors
Comments
Rex

We have stopped providing up-to-date versions

Intel has published an update on its Security Center website
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr


INTEL-SA-00088: (Revision 1.6 | 22-January-2018)
Recommendations:
Updated Jan. 22
We have now identified the root cause of the reboot issue impacting Broadwell and Haswell platforms, and made good progress in developing a solution to address it. Based on this, we are updating our guidance for customers and partners:
  • We recommend that OEMs, Cloud service providers, system manufacturers, software vendors and end users stop deployment of current versions on the below platforms, as they may introduce higher than expected reboots and other unpredictable system behavior.
  • We also ask that our industry partners focus efforts on testing early versions of the updated solution for Broadwell and Haswell we started rolling out this weekend, so we can accelerate its release. We expect to share more details on timing later this week.
  • For those concerned about system stability while we finalize the updated solutions, we are also working with our OEM partners on the option to utilize a previous version of microcode that does not display these issues, but removes the Variant 2 (Spectre) mitigations. This would be delivered via a BIOS update, and would not impact mitigations for Variant 1 (Spectre) and Variant 3 (Meltdown).
We believe it is important for OEMs and our customers to follow this guidance for all of the specified platforms listed below, as they may demonstrate higher than expected  reboots and unpredictable system behavior. 
The progress we have made in identifying a root cause for Haswell and Broadwell will help us address issues on other platforms. Please be assured we are working quickly to address these issues.
 

We follow Intel's recommendation and have stopped providing up-to-date versions!