BIOS security updates LGA 1155 - Intel Core processors 2nd and 3rd generation

From Thomas-Krenn-Wiki
Jump to navigation Jump to search
Please note that this article / this category refers either on older software / hardware components or is no longer maintained for other reasons.
This page is no longer updated and is purely for reference purposes still here in the archive available.

The following table shows available UEFI firmware/BIOS security updates for LGA 1155 (Sandy Bridge & Ivy Bridge) motherboards from Thomas-Krenn. In the columns of the table security flaws are listed, which require UEFI firmware/BIOS updates. For each mainboard it is noted whether an update is already available for the respective vulnerability. Information about other mainboards can be found in the article BIOS security updates.

In the case of security flaws that affect the CPU microcode (e.g. Spectre or L1TF), the microcode can in many cases also be applied alternatively via the operating system.

LGA 1155 - 2nd & 3rd Gen

  • Processors: Sandy Bridge (2nd Generation Intel Core Processor Family) / Ivy Bridge (3rd Generation Intel Core Processor Family)
Security update 2020.1 IPU
INTEL-SA-00295
INTEL-SA-00320
INTEL-SA-00322
2020-01
INTEL-SA-00329
2019-12
INTEL-SA-00289
INTEL-SA-00317
2019.2 IPU
INTEL-SA-00220
INTEL-SA-00241
INTEL-SA-00254
INTEL-SA-00270
2019.1 QSR
INTEL-SA-00213
INTEL-SA-00223
Microarchitectural Data Sampling - ZombieLoad
INTEL-SA-00233
2018.4 QSR
INTEL-SA-00185
INTEL-SA-00191
Intel ME, CSME, SPS und TXE
INTEL-SA-00125
INTEL-SA-00141
INTEL-SA-00142
Spectre V3a and V4, Foreshadow L1 Terminal Fault
INTEL-SA-00115
INTEL-SA-00161
Spectre Variant 2
INTEL-SA-00088
Update Microcode yes yes yes yes yes - - yes yes
Update SPS yes - - yes yes yes
SPS >= 4.00.04.383
SPS >=4.01.02.174
yes - -
Update Platform Sample / Silicon Reference firmware under investigation - - yes under investigation yes - - -
Update BIOS ACM firmware / SINIT ACM firmware under investigation - - yes ? ? ? ? ?
Supermicro X9SCA-F not affected Microcode update via OS recommended, no ME/SPS/TXT support from Intel[1] not affected not affected BIOS 2.3 (available on request) BIOS 2.3 (available on request)
Supermicro X9SCD-F not affected not affected not affected BIOS 2.3 (available on request) BIOS 2.3 (available on request)
Supermicro X9SCM-F not affected not affected not affected BIOS 2.3

References

  1. INTEL-SA-00213 Intel CSME, Intel SPS, Intel TXE, Intel DAL, and Intel AMT 2019.1 QSR Advisory (www.intel.com) Note: Firmware versions of Intel® ME 3.x thru 10.x, Intel® TXE 1.x thru 2.x and Intel® Server Platform Services 1.x thru 2.X are no longer supported, thus were not assessed for the vulnerabilities/CVEs listed in this Technical Advisory. There is no new release planned for these versions.
Foto Thomas Niedermeier.jpg

Author: Thomas Niedermeier

Thomas Niedermeier working in the product management team at Thomas-Krenn, completed his bachelor's degree in business informatics at the Deggendorf University of Applied Sciences. Since 2013 Thomas is employed at Thomas-Krenn and takes care of OPNsense firewalls, the Thomas-Krenn-Wiki and firmware security updates.


Foto Werner Fischer.jpg

Author: Werner Fischer

Werner Fischer, working in the Knowledge Transfer team at Thomas-Krenn, completed his studies of Computer and Media Security at FH Hagenberg in Austria. He is a regular speaker at many conferences like LinuxTag, OSMC, OSDC, LinuxCon, and author for various IT magazines. In his spare time he enjoys playing the piano and training for a good result at the annual Linz marathon relay.


Related articles

BIOS security updates LGA 2011 - Intel Xeon Sandy Bridge and Ivy Bridge
BIOS security updates LGA 2011-3 - Intel Xeon processors Haswell and Broadwell