BIOS security updates LGA 1151-2 - Intel Core processors 8th and 9th generation

From Thomas-Krenn-Wiki
Jump to navigation Jump to search

The following table shows available UEFI firmware/BIOS security updates for LGA 1151-2 (Coffee Lake & Coffee Lake Refresh) motherboards from Thomas-Krenn. In the columns of the table security flaws are listed, which require UEFI firmware/BIOS updates. For each mainboard it is noted whether an update is already available for the respective vulnerability. Information about other mainboards can be found in the article BIOS security updates.

In the case of security flaws that affect the CPU microcode (e.g. Spectre or L1TF), the microcode can in many cases also be applied alternatively via the operating system.

LGA 1151-2 - 8th Gen

  • Processors: Coffee Lake (8th Generation Intel Core Processor Family) / Coffee Lake Refresh (9th Generation Intel Core Processor Family)
  • SPS version: 05.00.* und 05.01.*

Security updates from 2022

The table below lists the security updates released as of 2022.

Security update 2022.1 IPU
INTEL-SA-00601
INTEL-SA-00613
INTEL-SA-00614
INTEL-SA-00616
INTEL-SA-00617
Update Microcode yes
Update SPS under investigation
Update Platform Sample / Silicon Reference firmware under investigation
Update BIOS ACM firmware / SINIT ACM firmware yes
ASUS P11C-I affected, Microcode update necessary
ASUS P11C-I/NGFF2280 affected, Microcode update necessary
ASUS P11C-M/4L affected, Microcode update necessary
Supermicro X11SCH-F / X11SCH-LN4F BIOS 1.8 (in development)
Supermicro X11SCL-IF BIOS 1.8 (in development)
LES plus v2.0 affected, Microcode update necessary

Security updates until 2021

The table below lists the security updates released through the end of 2021.

Security update 2021.2 IPU
INTEL-SA-00528
INTEL-SA-00562
2021.1 IPU
INTEL-SA-00442
INTEL-SA-00459
INTEL-SA-00463
INTEL-SA-00464
INTEL-SA-00465
2020.2 IPU
INTEL-SA-00381
INTEL-SA-00389
INTEL-SA-00391
2020-09-08
INTEL-SA-00347
INTEL-SA-00356
INTEL-SA-00404
2020.1 IPU
INTEL-SA-00295
INTEL-SA-00320
INTEL-SA-00322
2020-01
INTEL-SA-00329
2019-12
INTEL-SA-00289
INTEL-SA-00317
2019.2 IPU
INTEL-SA-00220
INTEL-SA-00241
INTEL-SA-00254
INTEL-SA-00270
2019.1 QSR
INTEL-SA-00213
INTEL-SA-00223
Microarchitectural Data Sampling - ZombieLoad
INTEL-SA-00233
2018.4 QSR
INTEL-SA-00185
INTEL-SA-00191
Intel ME, CSME, SPS und TXE
INTEL-SA-00125
INTEL-SA-00141
INTEL-SA-00142
Spectre V3a and V4, Foreshadow L1 Terminal Fault
INTEL-SA-00115
INTEL-SA-00161
Spectre Variant 2
INTEL-SA-00088
Update Microcode yes yes yes under investigation yes yes yes yes yes - - yes yes
Update SPS under investigation yes yes under investigation yes - - yes yes yes
SPS >= 4.00.04.383
SPS >=4.01.02.174
yes - -
Update Platform Sample / Silicon Reference firmware under investigation under investigation under investigation under investigation under investigation - - yes under investigation yes - - -
Update BIOS ACM firmware / SINIT ACM firmware under investigation under investigation under investigation under investigation under investigation - - yes ? ? ? ? ?
ASUS P11C-I affected, Microcode update necessary BIOS 4201 under investigation BIOS 3301 BIOS 3101 not affected not affected BIOS 0402
ASUS P11C-I/NGFF2280 affected, Microcode update necessary BIOS 4103 (test pending) under investigation BIOS 4002
ASUS P11C-M/4L affected, Microcode update necessary affected, Microcode and SPS firmware update necessary affected, Microcode and SPS firmware update necessary under investigation BIOS 4001 BIOS 3103 not affected not affected BIOS 0403
Supermicro X11SCH-F / X11SCH-LN4F BIOS 1.7 (in development) BIOS 1.6 BIOS 1.5 not affected BIOS 1.4 BIOS 1.3 BIOS 1.2 BIOS 1.0b not affected not affected BIOS 1.0b
Supermicro X11SCL-IF BIOS 1.7 (in development) BIOS 1.6 BIOS 1.5
LES plus v2.0 affected, Microcode update necessary BIOS KBR2L190 BIOS KBR2L170 BIOS KBR2L150
Foto Thomas Niedermeier.jpg

Author: Thomas Niedermeier

Thomas Niedermeier working in the product management team at Thomas-Krenn, completed his bachelor's degree in business informatics at the Deggendorf University of Applied Sciences. Since 2013 Thomas is employed at Thomas-Krenn and takes care of OPNsense firewalls, the Thomas-Krenn-Wiki and firmware security updates.


Foto Werner Fischer.jpg

Author: Werner Fischer

Werner Fischer, working in the Knowledge Transfer team at Thomas-Krenn, completed his studies of Computer and Media Security at FH Hagenberg in Austria. He is a regular speaker at many conferences like LinuxTag, OSMC, OSDC, LinuxCon, and author for various IT magazines. In his spare time he enjoys playing the piano and training for a good result at the annual Linz marathon relay.


Related articles

Intel DH55TC Desktop Motherboard
Replacing a Motherboard
Supermicro X7SLA-L and X7SLA-H Motherboards