MSI Releases Security Patch for Intel Vulnerability - Time to Flash BIOS
Posted on November 29, 2017
MSI has updated BIOS versions for their Intel 100, 200, and 300 series motherboards. They’re the latest of several manufacturers, including Gigabyte a week ago, to address security vulnerabilities in Intel’s TXE (Trusted Execution Engine). Intel says they have “provided system and motherboard manufacturers with the necessary firmware and software updates,” so it’s now up to those manufacturers to implement them. An Intel tool that detects whether systems are vulnerable is available here, as well as a list of vendors that have already released updates.
Owners of affected MSI motherboards should visit and find their model. BIOS and other downloads can be found under the “service” tab for each board. Instructions are similar for most other manufacturers.
You can find a list of affected CPUs here:
- 6th, 7th, and 8th generation Intel Core Processor Family
- Intel Xeon Processor E3-1200 v5 and v6 Product Family
- Intel Xeon Processor Scalable Family
- Intel Xeon Processor W Family
- Intel Atom C3000 Processor Family
- Apollo Lake Intel Atom Processor E3900 series
- Apollo Lake Intel Pentium Processors
- Intel Celeron N and J series Processors
Note: The current list of Intel partners implementing changes appears to primarily contain all-in-one or full system manufacturers (SIs), and not necessarily motherboard makers. This means that your MSI motherboard may not yet be ready for the firmware update -- we wouldn’t know without checking every single board. Some should certainly be ready to update.
It’s worth updating. Flashing BIOS on a modern motherboard is still mildly inconvenient, which means many people won’t, which means there will continue to be motivation down the line to take advantage of unupdated systems. Be sure to check the BIOS version even on brand new boards, as they often ship with outdated versions.
- Patrick Lathan