Dell XPS 15 9550/Precision 5510

Updating the system firmware improves performance.

Atom Feed

Version 1.15.0
2023-06-14 07:34:33

This stable release fixes the following issues:

  • Firmware updates to address the Intel Technical Advisory.

Urgency critical
Reported Success 97% (high confidence)
Fixed issues:
  • CVE-2020-8758

    Improper buffer restrictions in network subsystem in provisioned Intel(R) AMT and Intel(R) ISM versions before 11.8.79, 11.12.79, 11.22.79, 12.0.68 and 14.0.39 may allow an unauthenticated user to potentially enable escalation of privilege via network access. On un-provisioned systems, an authenticated user may potentially enable escalation of privilege via local access.

  • INTEL-TA-00404
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.14.0
2020-10-20 02:26:19

This stable release fixes the following issues:

  • Firmware updates to address the Intel Security Advisories.
  • Fixed the issue where the SMM Security Mitigation gets disabled while loading BIOS defaults.

Urgency critical
Reported Success 98% (high confidence)
Fixed issues:
  • CVE-2019-14607

    Improper conditions check in multiple IntelĀ® Processors may allow an authenticated user to potentially enable partial escalation of privilege, denial of service and/or information disclosure via local access.

  • CVE-2019-11157

    Improper conditions check in voltage settings for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege and/or information disclosure via local access.

  • INTEL-SA-00317
  • INTEL-SA-00289
Licenses
Security
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.13.1
2020-01-08 03:43:15

This stable release fixes the following issues:

  • Firmware updates to address security advisories
  • Fixed a BIOS Setup configuration issue that occurs after clearing the CMOS.
  • Fixed the issue where the force PreBoot Execution Environment (PXE) on next boot feature does not work with USB network card.

Some new functionality has also been added:

  • Added an enhancement to extend the BIOS password configuration measurements into the TPM.
  • Added a new feature to automatically suspend BitLocker before upgrading the firmware.After the firmware upgrade is complete, BitLocker is automatically enabled.

Urgency critical
Reported Success 100% (high confidence)
Fixed issues:
  • CVE-2019-11135

    TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.

  • CVE-2019-0123

    Insufficient memory protection in Intel(R) 6th Generation Core Processors and greater, supporting SGX, may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2019-0117

    Insufficient access control in protected memory subsystem for Intel(R) SGX for 6th, 7th, 8th, 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Xeon(R) Processor E3-1500 v5, v6 Families; Intel(R) Xeon(R) E-2100 & E-2200 Processor Families with Intel(R) Processor Graphics may allow a privileged user to potentially enable information disclosure via local access.

  • CVE-2019-0185

    Insufficient access control in protected memory subsystem for SMM for 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor families; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 families; Intel(R) Xeon(R) E-2100 and E-2200 Processor families with Intel(R) Processor Graphics may allow a privileged user to potentially enable information disclosure via local access.

  • CVE-2019-0154

    Insufficient access control in subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gold Series; Intel(R) Celeron(R) Processor J, N, G3900 and G4900 Series; Intel(R) Atom(R) Processor A and E3900 Series; Intel(R) Xeon(R) Processor E3-1500 v5 and v6 and E-2100 Processor Families may allow an authenticated user to potentially enable denial of service via local access.

  • CVE-2019-11147

    Insufficient access control in hardware abstraction driver for MEInfo software for Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.0, 14.0.10; TXEInfo software for Intel(R) TXE before versions 3.1.70 and 4.0.20; INTEL-SA-00086 Detection Tool version 1.2.7.0 or before; INTEL-SA-00125 Detection Tool version 1.0.45.0 or before may allow an authenticated user to potentially enable escalation of privilege via local access.

  • CVE-2019-11131

    Logic issue in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via network access.

  • CVE-2019-11132

    Cross site scripting in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow a privileged user to potentially enable escalation of privilege via network access.

  • CVE-2019-11106

    Insufficient session validation in the subsystem for Intel(R) CSME before versions 11.8.70, 12.0.45, 13.0.10 and 14.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2019-11100

    Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via physical access.

  • CVE-2019-11101

    Insufficient input validation in the subsystem for Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.10 and 14.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow a privileged user to potentially enable information disclosure via local access.

  • CVE-2019-11087

    Insufficient input validation in the subsystem for Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.10 and 14.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow a privileged user to potentially enable escalation of privilege, information disclosure or denial of service via local access.

  • CVE-2019-0168

    Insufficient input validation in the subsystem for Intel(R) CSME before versions 11.8.70, 12.0.45 and 13.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow a privileged user to potentially enable information disclosure via local access.

  • CVE-2019-0166

    Insufficient input validation in the subsystem for Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable information disclosure via network access.

  • CVE-2019-0131

    Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable denial of service or information disclosure via adjacent access.

  • CVE-2019-11104

    Insufficient input validation in MEInfo software for Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.10 and 14.0.10; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow an authenticated user to potentially enable escalation of privilege via local access.

  • CVE-2019-11088

    Insufficient input validation in subsystem in Intel(R) AMT before versions 11.8.70, 11.11.70, 11.22.70 and 12.0.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

  • CVE-2019-0169

    Heap overflow in subsystem in Intel(R) CSME before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45; Intel(R) TXE before versions 3.1.70 and 4.0.20 may allow an unauthenticated user to potentially enable escalation of privileges, information disclosure or denial of service via adjacent access.

  • CVE-2019-11090

    Cryptographic timing conditions in the subsystem for Intel(R) PTT before versions 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.0 and 14.0.10; Intel(R) TXE 3.1.70 and 4.0.20; Intel(R) SPS before versions SPS_E5_04.01.04.305.0, SPS_SoC-X_04.00.04.108.0, SPS_SoC-A_04.00.04.191.0, SPS_E3_04.01.04.086.0, SPS_E3_04.08.04.047.0 may allow an unauthenticated user to potentially enable information disclosure via network access.

  • INTEL-SA-00270
  • INTEL-SA-00220
  • INTEL-SA-00219
  • INTEL-SA-00254
  • INTEL-SA-00260
  • INTEL-SA-00241
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.12.0
2019-11-18 05:23:57

This stable release fixes the following issues:

  • Fixed the issue where the mouse lags when the Dell TB16 dock is unplugged or plugged in.
  • Fixed the issue where the screen does not display content when the lid is opened and closed repeatedly.
  • Firmware updates to address security advisory INTEL-SA-00213.Some new functionality has also been added.
  • Firmware updates to address security advisories INTEL-SA-00233.Some new functionality has also been added.
  • Fixed the issue where the BitLocker prompts for recovery.It occurs when Auto Power On option in BIOS setup is set to wake up the system at a specific time.

Some new functionality has also been added:

  • Modified battery algorithm to prolong lifespan and minimize risk of swelling.

Urgency critical
Reported Success 100% (high confidence)
Fixed issues:
  • CVE-2019-11091

    Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

  • CVE-2018-12130

    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

  • CVE-2018-12127

    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

  • CVE-2018-12126

    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

  • CVE-2019-0096

    Out of bound write vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an authenticated user to potentially enable escalation of privilege via adjacent network access.

  • CVE-2019-0094

    Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable denial of service via adjacent network access.

  • CVE-2019-0093

    Insufficient data sanitization vulnerability in HECI subsystem for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) SPS before version SPS_E3_05.00.04.027.0 may allow a privileged user to potentially enable information disclosure via local access.

  • CVE-2019-0092

    Insufficient input validation vulnerability in subsystem for Intel(R) AMT before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

  • CVE-2019-0091

    Code injection vulnerability in installer for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access.

  • CVE-2019-0086

    Insufficient access control vulnerability in Dynamic Application Loader software for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access.

Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.11.2
2019-08-12 06:26:30

This stable release fixes the following issues:

  • Fixed the issue where the TPM option disappears from the BIOS setup menu intermittently.

Urgency critical
Reported Success 96% (high confidence)
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.10.0
2019-06-24 02:36:05

Fixes- Firmware updates to address security advisory INTEL-SA-00185

  • Fixed an issue with Secure Boot Option ROM Signature Verification
  • Fixed the issue where the BIOS option SupportAssist OS Recovery stays in the Enabled state after the system fails to boot.

Urgency high
Reported Success 100% (medium confidence)
Fixed issues:
  • CVE-2018-12185

    Insufficient input validation in Intel(R) AMT in Intel(R) CSME before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially execute arbitrary code via physical access.

  • CVE-2018-12196

    Insufficient input validation in Intel(R) AMT in Intel(R) CSME before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow a privileged user to potentially execute arbitrary code via local access.

  • CVE-2018-12187

    Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access.

  • CVE-2018-12200

    Insufficient access control in Intel(R) Capability Licensing Service before version 1.50.638.1 may allow an unprivileged user to potentially escalate privileges via local access.

  • CVE-2018-12198

    Insufficient input validation in Intel(R) Server Platform Services HECI subsystem before version SPS_E5_04.00.04.393.0 may allow privileged user to potentially cause a denial of service via local access.

  • CVE-2018-12199

    Buffer overflow in an OS component in Intel CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 and Intel TXE version before 3.1.60 or 4.0.10 may allow a privileged user to potentially execute arbitrary code via physical access.

  • CVE-2018-12192

    Logic bug in Kernel subsystem in Intel CSME before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20, or Intel(R) Server Platform Services before version SPS_E5_04.00.04.393.0 may allow an unauthenticated user to potentially bypass MEBx authentication via physical access.

  • CVE-2018-12191

    Bounds check in Kernel subsystem in Intel CSME before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20, or Intel(R) Server Platform Services before versions 4.00.04.383 or SPS 4.01.02.174, or Intel(R) TXE before versions 3.1.60 or 4.0.10 may allow an unauthenticated user to potentially execute arbitrary code via physical access.

  • CVE-2018-12190

    Insufficient input validation in Intel(r) CSME subsystem before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 or Intel(r) TXE before 3.1.60 or 4.0.10 may allow a privileged user to potentially enable an escalation of privilege via local access.

  • CVE-2018-12188

    Insufficient input validation in Intel CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 or Intel TXE before version 3.1.60 or 4.0.10 may allow an unauthenticated user to potentially modify data via physical access.

Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.9.0
2018-10-24 05:21:22

This stable release fixes the following issues:

  • Fixed a potential system hang issue when an incorrectly formatted password is entered at the BIOS Security Manager (BIOS pre-boot password) prompt

Some new functionality has also been added:

  • Enable WSMT security enhancement for Windows 10 Creators Update
  • Added TPM PPI Bypass for Clear Command support
  • Added BIOS Password Feature: Master Password Lockout

Urgency high
Reported Success 97% (medium confidence)
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.8.0
2018-08-16 07:04:55

Urgency unknown
Reported Success 100% (high confidence)
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.7.0
2018-04-12 08:36:47

Enhancements: 1.Improved the stability for the file transferring within pre-OS USB LAN connection 2.Improved keyboard typing experience with high WPM

Urgency medium
Reported Success 90% (medium confidence)
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.6.1
2018-02-13 03:37:50

Urgency unknown
Reported Success 100% (low confidence)
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.5.1
2018-01-29 08:47:02

Urgency unknown
Reported Success 100% (low confidence)
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.4.0
2017-09-18 02:54:04

Urgency None
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.3.0
2017-08-30 02:08:29

Urgency None
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.2.29
2017-08-07 01:45:34

Urgency None
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.2.25
2017-05-16 05:27:27

Urgency None
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.2.21
2017-04-12 00:47:37

Urgency unknown
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.2.19
2017-02-07 09:26:56

Urgency None
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.2.18
2017-01-11 06:37:02

Urgency None
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.2.14
2016-10-12 07:58:47

Urgency None
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.2.10
2016-07-11 16:31:35

Urgency None
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.2.0
2016-04-21 16:41:51

Urgency None
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.1.19
2016-02-08 22:42:54

Urgency None
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details Compare with previous

Version 1.1.15
2016-02-04 03:43:00

Urgency None
Licenses
Security
  • Contains Absolute Computrace Agent More info
  • No issues found using FwHunt from Binarly More info
  • Update is cryptographically signed More info
  • Added to the LVFS by Dell More info
  • Firmware can be verified after flashing More info
  • Virus checked using ClamAV More info
  • Vendor considers this device end of life More info
  • Firmware has no attestation checksums More info
  • Firmware has no detected SBoM More info
Release Gating
Download Archive Firmware Details

LVFS © 2015 Richard Hughes with icons from Font Awesome and GeoIP data from IP2Location.

Linux Vendor Firmware Service Project a Series of LF Projects, LLC :: Charter