** CRITICAL ** Online ROM Flash Component for Windows x64 - HPE ML30 Gen9 Server Platform Services (SPS) Firmware By downloading, you agree to the terms and conditions of the Hewlett Packard Enterprise Software License Agreement. Note: Some software requires a valid warranty, current Hewlett Packard Enterprise support contract, or a license fee. Type: | Firmware - System | Version: | 04.01.04.054(16 Nov 2017) | Operating System(s): | Microsoft Windows Server 2012 Essentials | Microsoft Windows Server 2012 R2 | Microsoft Windows Server 2016 | Microsoft Windows Server 2012 | File name: | cp033879.exe (3.9 MB) |
This component updates SPS/ME Firmware Operational Image. Upgrade Requirement: Recommended - HPE recommends users update to this version at their earliest convenience. Important Notes: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. Firmware Dependencies: None Enhancements/New Features: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. Known Issues: None Prerequisites:
Integrated Lights-Out 4 version 2.0 or later is required. 'HPE ProLiant iLO 3/4 Channel Interface Driver” (CHIF) To ensure the integrity of your download, HPE recommends verifying your results with this SHA-256 Checksum value: 00772d30bed262ead8b597cc4246fc62cf0e9c7dc85775f7206c4187e36a2036 | cp033879.exe |
Reboot Requirement: Reboot is required after installation for updates to take effect and hardware stability to be maintained. Installation:
To update firmware from Windows operating system on target server: - Place the Smart Component in a temporary directory.
- From the same directory, run the Smart Component by double clicking it.
- When the Smart Component dialog window displays, click the Install button to initiate the firmware upgrade.
- Power cycle the system.
End User License Agreements: HPE Software License Agreement v1 Hewlett-Packard End User License Agreement
Upgrade Requirement: Critical - HPE requires users update to this version immediately. Important:
Important Notes: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers. This component is not suitable for remote and/or automated deployment. You must have physical access to the server. After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient. The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message: 'The software is not supported for installation on this system. You must install the iLO Channel Interface driver to use this component.' Deliverable Name: HPE ML30 Gen9 Server Platform Services (SPS) Firmware Release Version: 04.01.04.054 Last Recommended or Critical Revision: 04.01.04.054 Previous Revision: 04.00.03.096.0 Firmware Dependencies: Integrated Lights-Out 4 version 2.0 or later Enhancements/New Features: None Problems Fixed: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers. Known Issues: None Upgrade Requirement: Critical - HPE requires users update to this version immediately. Important Notes: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers. This component is not suitable for remote and/or automated deployment. You must have physical access to the server. After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient. The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message: 'The software is not supported for installation on this system. You must install the iLO Channel Interface driver to use this component.' Firmware Dependencies: Integrated Lights-Out 4 version 2.0 or later Fixes: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers. Known Issues: None Important Notes: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers. This component is not suitable for remote and/or automated deployment. You must have physical access to the server. After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient. The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message: 'The software is not supported for installation on this system. You must install the iLO Channel Interface driver to use this component.' Deliverable Name: HPE ML30 Gen9 Server Platform Services (SPS) Firmware Release Version: 04.01.04.054 Last Recommended or Critical Revision: 04.01.04.054 Previous Revision: 04.00.03.096.0 Firmware Dependencies: Integrated Lights-Out 4 version 2.0 or later Enhancements/New Features: None Problems Fixed: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers. Known Issues: None Version:04.01.04.054 (16 Nov 2017) Upgrade Requirement: Critical - HPE requires users update to this version immediately. Important Notes: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers. This component is not suitable for remote and/or automated deployment. You must have physical access to the server. After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient. The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message: 'The software is not supported for installation on this system. You must install the iLO Channel Interface driver to use this component.' Firmware Dependencies: Integrated Lights-Out 4 version 2.0 or later Fixes: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers. Known Issues: None Upgrade Requirement: Recommended - HPE recommends users update to this version at their earliest convenience. Important Notes: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. Firmware Dependencies: None Enhancements/New Features: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. Known Issues: None Version:04.00.03.096.0 (14 Jun 2016) Upgrade Requirement: Recommended - HPE recommends users update to this version at their earliest convenience. 'Initial public update for HPE ProLiant ML30 Gen9 SPS/ME Firmware.' “Review the Release Notes text file for details about the changes to the SPS ME image. The Release Notes file can be downloaded from <ME_ML30_Gen9_Greenlow@04.00.03.096.0__pca_en>, which was used in the build of this Flash Component.” Type: | Firmware - System | Version: | 04.01.04.054(16 Nov 2017) | Operating System(s): | Microsoft Windows Server 2012 | Microsoft Windows Server 2012 Essentials | Microsoft Windows Server 2012 R2 | Microsoft Windows Server 2016 |
|
DescriptionThis component updates SPS/ME Firmware Operational Image. EnhancementsUpgrade Requirement: Recommended - HPE recommends users update to this version at their earliest convenience. Important Notes: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. Firmware Dependencies: None Enhancements/New Features: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. Known Issues: None Installation InstructionsPrerequisites:
Integrated Lights-Out 4 version 2.0 or later is required. 'HPE ProLiant iLO 3/4 Channel Interface Driver” (CHIF) To ensure the integrity of your download, HPE recommends verifying your results with this SHA-256 Checksum value: 00772d30bed262ead8b597cc4246fc62cf0e9c7dc85775f7206c4187e36a2036 | cp033879.exe |
Reboot Requirement: Reboot is required after installation for updates to take effect and hardware stability to be maintained. Installation:
To update firmware from Windows operating system on target server: - Place the Smart Component in a temporary directory.
- From the same directory, run the Smart Component by double clicking it.
- When the Smart Component dialog window displays, click the Install button to initiate the firmware upgrade.
- Power cycle the system.
Release NotesEnd User License Agreements: HPE Software License Agreement v1 Hewlett-Packard End User License Agreement
Upgrade Requirement: Critical - HPE requires users update to this version immediately. Important:
Important Notes: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers. This component is not suitable for remote and/or automated deployment. You must have physical access to the server. After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient. The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message: 'The software is not supported for installation on this system. You must install the iLO Channel Interface driver to use this component.' Deliverable Name: HPE ML30 Gen9 Server Platform Services (SPS) Firmware Release Version: 04.01.04.054 Last Recommended or Critical Revision: 04.01.04.054 Previous Revision: 04.00.03.096.0 Firmware Dependencies: Integrated Lights-Out 4 version 2.0 or later Enhancements/New Features: None Problems Fixed: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers. Known Issues: None FixesUpgrade Requirement: Critical - HPE requires users update to this version immediately. ZTE USA manufacturers a variety of popular phones. Visit our website for more details! Download ZTE ADB driver or connecting your device to a computer, CDC, VCOM Driver, and Qualcomm Driver For Flashing Firmware. However, if you have ADB drivers installed on your PC, then you don’t have to download extra drivers for device connection. ADB drivers are compatible with ZTE devices. Download ZTE USB Drivers – Latest Version 2020. The package provides the installation files for ZTE Android Phone USB Driver version 5.2066.1.6. If the driver is already installed on your system, updating (overwrite-installing) may fix various issues, add new functions, or just upgrade to the available version. The package provides the installation files for ZTE Mobile Broadband Network Adapter Driver version 12.0.0.13. If the driver is already installed on your system, updating (overwrite-installing) may fix various issues, add new functions, or just upgrade to the available version. Important Notes: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers. This component is not suitable for remote and/or automated deployment. You must have physical access to the server. After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient. The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message: 'The software is not supported for installation on this system. You must install the iLO Channel Interface driver to use this component.' Firmware Dependencies: Integrated Lights-Out 4 version 2.0 or later Fixes: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers. Known Issues: None ImportantImportant Notes: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers. This component is not suitable for remote and/or automated deployment. You must have physical access to the server. After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient. The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message: 'The software is not supported for installation on this system. You must install the iLO Channel Interface driver to use this component.' Deliverable Name: HPE ML30 Gen9 Server Platform Services (SPS) Firmware Release Version: 04.01.04.054 Last Recommended or Critical Revision: 04.01.04.054 Previous Revision: 04.00.03.096.0 Firmware Dependencies: Integrated Lights-Out 4 version 2.0 or later Enhancements/New Features: None Problems Fixed: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers. Known Issues: None Revision HistoryVersion:04.01.04.054 (16 Nov 2017) Upgrade Requirement: Critical - HPE requires users update to this version immediately. Important Notes: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers. This component is not suitable for remote and/or automated deployment. You must have physical access to the server. After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient. The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message: 'The software is not supported for installation on this system. You must install the iLO Channel Interface driver to use this component.' Firmware Dependencies: Integrated Lights-Out 4 version 2.0 or later Fixes: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers. Known Issues: None Upgrade Requirement: Recommended - HPE recommends users update to this version at their earliest convenience. Important Notes: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. Firmware Dependencies: None Enhancements/New Features: This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers. Known Issues: None Version:04.00.03.096.0 (14 Jun 2016) Upgrade Requirement: Recommended - HPE recommends users update to this version at their earliest convenience. 'Initial public update for HPE ProLiant ML30 Gen9 SPS/ME Firmware.' “Review the Release Notes text file for details about the changes to the SPS ME image. The Release Notes file can be downloaded from <ME_ML30_Gen9_Greenlow@04.00.03.096.0__pca_en>, which was used in the build of this Flash Component.” |
|