SPS Driver



  1. Sps Drives
  2. Sps Drives 2019
Printable version

Sps Drives

** CRITICAL ** Online ROM Flash Component for Windows x64 - HPE ML30 Gen9 Server Platform Services (SPS) Firmware

By downloading, you agree to the terms and conditions of the Hewlett Packard Enterprise Software License Agreement.
Note: Some software requires a valid warranty, current Hewlett Packard Enterprise support contract, or a license fee.

Type:Firmware - System
Version:04.01.04.054(16 Nov 2017)
Operating System(s):
Microsoft Windows Server 2012 Essentials
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016
Microsoft Windows Server 2012
File name:cp033879.exe (3.9 MB)
This component updates SPS/ME Firmware Operational Image.

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

Firmware Dependencies:

None

Enhancements/New Features:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

Known Issues:

None

Prerequisites:

Integrated Lights-Out 4 version 2.0 or later is required.

'HPE ProLiant iLO 3/4 Channel Interface Driver” (CHIF)

To ensure the integrity of your download, HPE recommends verifying your results with this SHA-256 Checksum value:

00772d30bed262ead8b597cc4246fc62cf0e9c7dc85775f7206c4187e36a2036cp033879.exe

Reboot Requirement:
Reboot is required after installation for updates to take effect and hardware stability to be maintained.

Installation:

To update firmware from Windows operating system on target server:

  1. Place the Smart Component in a temporary directory.
  2. From the same directory, run the Smart Component by double clicking it.
  3. When the Smart Component dialog window displays, click the Install button to initiate the firmware upgrade.
  4. Power cycle the system.

End User License Agreements:
HPE Software License Agreement v1
Hewlett-Packard End User License Agreement

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important:

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

This component is not suitable for remote and/or automated deployment. You must have physical access to the server.

After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient.

The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message:

'The software is not supported for installation on this system.
You must install the iLO Channel Interface driver to use this component.'

Deliverable Name:

HPE ML30 Gen9 Server Platform Services (SPS) Firmware

Release Version:

04.01.04.054

Last Recommended or Critical Revision:

04.01.04.054

Previous Revision:

04.00.03.096.0

Firmware Dependencies:

Integrated Lights-Out 4 version 2.0 or later

Enhancements/New Features:

None

Problems Fixed:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

Known Issues:

None

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

This component is not suitable for remote and/or automated deployment. You must have physical access to the server.

After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient.

The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message:

'The software is not supported for installation on this system.
You must install the iLO Channel Interface driver to use this component.'

Firmware Dependencies:

Integrated Lights-Out 4 version 2.0 or later

Fixes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

Known Issues:

None

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

This component is not suitable for remote and/or automated deployment. You must have physical access to the server.

After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient.

The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message:

'The software is not supported for installation on this system.
You must install the iLO Channel Interface driver to use this component.'

Deliverable Name:

HPE ML30 Gen9 Server Platform Services (SPS) Firmware

Release Version:

04.01.04.054

Last Recommended or Critical Revision:

04.01.04.054

Previous Revision:

04.00.03.096.0

Firmware Dependencies:

Integrated Lights-Out 4 version 2.0 or later

Enhancements/New Features:

None

Problems Fixed:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

Known Issues:

None

Version:04.01.04.054 (16 Nov 2017)

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

This component is not suitable for remote and/or automated deployment. You must have physical access to the server.

After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient.

The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message:

'The software is not supported for installation on this system.
You must install the iLO Channel Interface driver to use this component.'

Firmware Dependencies:

Integrated Lights-Out 4 version 2.0 or later

Fixes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

Known Issues:

None

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

Firmware Dependencies:

None

Enhancements/New Features:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

Known Issues:

None


Version:04.00.03.096.0 (14 Jun 2016)

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.

'Initial public update for HPE ProLiant ML30 Gen9 SPS/ME Firmware.'

“Review the Release Notes text file for details about the changes to the SPS ME image. The Release Notes file can be downloaded from <ME_ML30_Gen9_Greenlow@04.00.03.096.0__pca_en>, which was used in the build of this Flash Component.”


Type:Firmware - System
Version:04.01.04.054(16 Nov 2017)
Operating System(s):
Microsoft Windows Server 2012
Microsoft Windows Server 2012 Essentials
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016

Description

This component updates SPS/ME Firmware Operational Image.

Enhancements

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

Firmware Dependencies:

None

Enhancements/New Features:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

Known Issues:

None

Installation Instructions

Prerequisites:

Integrated Lights-Out 4 version 2.0 or later is required.

'HPE ProLiant iLO 3/4 Channel Interface Driver” (CHIF)

To ensure the integrity of your download, HPE recommends verifying your results with this SHA-256 Checksum value:

00772d30bed262ead8b597cc4246fc62cf0e9c7dc85775f7206c4187e36a2036cp033879.exe

Reboot Requirement:
Reboot is required after installation for updates to take effect and hardware stability to be maintained.

Installation:

To update firmware from Windows operating system on target server:

  1. Place the Smart Component in a temporary directory.
  2. From the same directory, run the Smart Component by double clicking it.
  3. When the Smart Component dialog window displays, click the Install button to initiate the firmware upgrade.
  4. Power cycle the system.

Release Notes

End User License Agreements:
HPE Software License Agreement v1
Hewlett-Packard End User License Agreement

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important:

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

This component is not suitable for remote and/or automated deployment. You must have physical access to the server.

After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient.

The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message:

'The software is not supported for installation on this system.
You must install the iLO Channel Interface driver to use this component.'

Deliverable Name:

HPE ML30 Gen9 Server Platform Services (SPS) Firmware

Release Version:

04.01.04.054

Last Recommended or Critical Revision:

04.01.04.054

Previous Revision:

04.00.03.096.0

Firmware Dependencies:

Integrated Lights-Out 4 version 2.0 or later

Enhancements/New Features:

None

Problems Fixed:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

Known Issues:

None

Fixes

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

This component is not suitable for remote and/or automated deployment. You must have physical access to the server.

After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient.

The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message:

'The software is not supported for installation on this system.
You must install the iLO Channel Interface driver to use this component.'

Firmware Dependencies:

Integrated Lights-Out 4 version 2.0 or later

Fixes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

Known Issues:

None

Important

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

This component is not suitable for remote and/or automated deployment. You must have physical access to the server.

After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient.

The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message:

'The software is not supported for installation on this system.
You must install the iLO Channel Interface driver to use this component.'

Deliverable Name:

HPE ML30 Gen9 Server Platform Services (SPS) Firmware

Release Version:

04.01.04.054

Last Recommended or Critical Revision:

04.01.04.054

Previous Revision:

04.00.03.096.0

Firmware Dependencies:

Integrated Lights-Out 4 version 2.0 or later

Enhancements/New Features:

None

Problems Fixed:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

Known Issues:

None

Revision History

Version:04.01.04.054 (16 Nov 2017)

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

This component is not suitable for remote and/or automated deployment. You must have physical access to the server.

After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient.

The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message:

'The software is not supported for installation on this system.
You must install the iLO Channel Interface driver to use this component.'

Firmware Dependencies:

Integrated Lights-Out 4 version 2.0 or later

Fixes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

Known Issues:

None

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

Firmware Dependencies:

None

Enhancements/New Features:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

Known Issues:

None


Version:04.00.03.096.0 (14 Jun 2016)

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.

'Initial public update for HPE ProLiant ML30 Gen9 SPS/ME Firmware.'

“Review the Release Notes text file for details about the changes to the SPS ME image. The Release Notes file can be downloaded from <ME_ML30_Gen9_Greenlow@04.00.03.096.0__pca_en>, which was used in the build of this Flash Component.”


Sps Drives 2019

SpsSPS Driver

Legal Disclaimer: Products sold prior to the November 1, 2015 separation of Hewlett-Packard Company into Hewlett Packard Enterprise Company and HP Inc. may have older product names and model numbers that differ from current models.

Driver

2020.03.2 SPP and later contains all updates pertaining to Customer Bulletin a00097789enus with the exception of the HPE Smart Array S100i SR Gen10 SW RAID Driver for Windows Server 2012 R2, Windows Server 2016, and Windows Server 2019 v106.12.6.0. This driver can be found on HPE.com and on Custom Download.

Printable version

** CRITICAL ** Online ROM Flash Component for Windows x64 - HPE ML30 Gen9 Server Platform Services (SPS) Firmware

By downloading, you agree to the terms and conditions of the Hewlett Packard Enterprise Software License Agreement.
Note: Some software requires a valid warranty, current Hewlett Packard Enterprise support contract, or a license fee.

Type:Firmware - System
Version:04.01.04.054(16 Nov 2017)
Operating System(s):
Microsoft Windows Server 2012 Essentials
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016
Microsoft Windows Server 2012
File name:cp033879.exe (3.9 MB)
This component updates SPS/ME Firmware Operational Image.

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

Firmware Dependencies:

None

Enhancements/New Features:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

Known Issues:

None

Prerequisites:

Integrated Lights-Out 4 version 2.0 or later is required.

'HPE ProLiant iLO 3/4 Channel Interface Driver” (CHIF)

To ensure the integrity of your download, HPE recommends verifying your results with this SHA-256 Checksum value:

00772d30bed262ead8b597cc4246fc62cf0e9c7dc85775f7206c4187e36a2036cp033879.exe

Reboot Requirement:
Reboot is required after installation for updates to take effect and hardware stability to be maintained.

Installation:

To update firmware from Windows operating system on target server:

  1. Place the Smart Component in a temporary directory.
  2. From the same directory, run the Smart Component by double clicking it.
  3. When the Smart Component dialog window displays, click the Install button to initiate the firmware upgrade.
  4. Power cycle the system.

End User License Agreements:
HPE Software License Agreement v1
Hewlett-Packard End User License Agreement

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important:

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

This component is not suitable for remote and/or automated deployment. You must have physical access to the server.

After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient.

The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message:

'The software is not supported for installation on this system.
You must install the iLO Channel Interface driver to use this component.'

Deliverable Name:

HPE ML30 Gen9 Server Platform Services (SPS) Firmware

Release Version:

04.01.04.054

Last Recommended or Critical Revision:

04.01.04.054

Previous Revision:

04.00.03.096.0

Firmware Dependencies:

Integrated Lights-Out 4 version 2.0 or later

Enhancements/New Features:

None

Problems Fixed:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

Known Issues:

None

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

This component is not suitable for remote and/or automated deployment. You must have physical access to the server.

After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient.

The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message:

'The software is not supported for installation on this system.
You must install the iLO Channel Interface driver to use this component.'

Firmware Dependencies:

Integrated Lights-Out 4 version 2.0 or later

Fixes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

Known Issues:

None

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

This component is not suitable for remote and/or automated deployment. You must have physical access to the server.

After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient.

The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message:

'The software is not supported for installation on this system.
You must install the iLO Channel Interface driver to use this component.'

Deliverable Name:

HPE ML30 Gen9 Server Platform Services (SPS) Firmware

Release Version:

04.01.04.054

Last Recommended or Critical Revision:

04.01.04.054

Previous Revision:

04.00.03.096.0

Firmware Dependencies:

Integrated Lights-Out 4 version 2.0 or later

Enhancements/New Features:

None

Problems Fixed:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

Known Issues:

None

Version:04.01.04.054 (16 Nov 2017)

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

This component is not suitable for remote and/or automated deployment. You must have physical access to the server.

After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient.

The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message:

'The software is not supported for installation on this system.
You must install the iLO Channel Interface driver to use this component.'

Firmware Dependencies:

Integrated Lights-Out 4 version 2.0 or later

Fixes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

Known Issues:

None

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

Firmware Dependencies:

None

Enhancements/New Features:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

Known Issues:

None


Version:04.00.03.096.0 (14 Jun 2016)

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.

'Initial public update for HPE ProLiant ML30 Gen9 SPS/ME Firmware.'

“Review the Release Notes text file for details about the changes to the SPS ME image. The Release Notes file can be downloaded from <ME_ML30_Gen9_Greenlow@04.00.03.096.0__pca_en>, which was used in the build of this Flash Component.”


Type:Firmware - System
Version:04.01.04.054(16 Nov 2017)
Operating System(s):
Microsoft Windows Server 2012
Microsoft Windows Server 2012 Essentials
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2016

Description

This component updates SPS/ME Firmware Operational Image.

Enhancements

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

Firmware Dependencies:

None

Enhancements/New Features:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

Known Issues:

None

Installation Instructions

Prerequisites:

Integrated Lights-Out 4 version 2.0 or later is required.

'HPE ProLiant iLO 3/4 Channel Interface Driver” (CHIF)

To ensure the integrity of your download, HPE recommends verifying your results with this SHA-256 Checksum value:

00772d30bed262ead8b597cc4246fc62cf0e9c7dc85775f7206c4187e36a2036cp033879.exe

Reboot Requirement:
Reboot is required after installation for updates to take effect and hardware stability to be maintained.

Installation:

To update firmware from Windows operating system on target server:

  1. Place the Smart Component in a temporary directory.
  2. From the same directory, run the Smart Component by double clicking it.
  3. When the Smart Component dialog window displays, click the Install button to initiate the firmware upgrade.
  4. Power cycle the system.

Release Notes

End User License Agreements:
HPE Software License Agreement v1
Hewlett-Packard End User License Agreement

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important:

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

This component is not suitable for remote and/or automated deployment. You must have physical access to the server.

After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient.

The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message:

'The software is not supported for installation on this system.
You must install the iLO Channel Interface driver to use this component.'

Deliverable Name:

HPE ML30 Gen9 Server Platform Services (SPS) Firmware

Release Version:

04.01.04.054

Last Recommended or Critical Revision:

04.01.04.054

Previous Revision:

04.00.03.096.0

Firmware Dependencies:

Integrated Lights-Out 4 version 2.0 or later

Enhancements/New Features:

None

Problems Fixed:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

Known Issues:

None

Fixes

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

This component is not suitable for remote and/or automated deployment. You must have physical access to the server.

After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient.

The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message:

'The software is not supported for installation on this system.
You must install the iLO Channel Interface driver to use this component.'

Firmware Dependencies:

Integrated Lights-Out 4 version 2.0 or later

Fixes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

Known Issues:

None

Important

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

This component is not suitable for remote and/or automated deployment. You must have physical access to the server.

After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient.

The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message:

'The software is not supported for installation on this system.
You must install the iLO Channel Interface driver to use this component.'

Deliverable Name:

HPE ML30 Gen9 Server Platform Services (SPS) Firmware

Release Version:

04.01.04.054

Last Recommended or Critical Revision:

04.01.04.054

Previous Revision:

04.00.03.096.0

Firmware Dependencies:

Integrated Lights-Out 4 version 2.0 or later

Enhancements/New Features:

None

Problems Fixed:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

Known Issues:

None

Revision History

Version:04.01.04.054 (16 Nov 2017)

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

This component is not suitable for remote and/or automated deployment. You must have physical access to the server.

After flashing the ME Firmware, you must cycle power for the changes to take effect. Pressing the power button is not sufficient.

The appropriate device driver must be installed and running before using this flash component. On Linux, install the HP ProLiant Channel Interface Device Driver for iLO. If the driver is not running you will receive the following error message:

'The software is not supported for installation on this system.
You must install the iLO Channel Interface driver to use this component.'

Firmware Dependencies:

Integrated Lights-Out 4 version 2.0 or later

Fixes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

This revision of the Silicon Platform Services (SPS) Firmware provides mitigation to the latest CSME security vulnerabilities, also known as Local Escalation Privilege. This vulnerability is defined in CVE-2019-0089. This issue is not unique to HPE servers.

Known Issues:

None

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.

Important Notes:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

Firmware Dependencies:

None

Enhancements/New Features:

This is a new release of the Intel Platform Service (SPS) Firmware revision 4.01.04.054. This revision has mitigated security vulnerability CVE-2017-5706 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5706) and CVE-2017-5709 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2017-5709). It is anticipated that details regarding these security vulnerabilities will be published to these links on November 20,2017. These security vulnerabilities are not unique to HPE servers.

Known Issues:

None


Version:04.00.03.096.0 (14 Jun 2016)

Upgrade Requirement:
Recommended - HPE recommends users update to this version at their earliest convenience.

'Initial public update for HPE ProLiant ML30 Gen9 SPS/ME Firmware.'

“Review the Release Notes text file for details about the changes to the SPS ME image. The Release Notes file can be downloaded from <ME_ML30_Gen9_Greenlow@04.00.03.096.0__pca_en>, which was used in the build of this Flash Component.”


Legal Disclaimer: Products sold prior to the November 1, 2015 separation of Hewlett-Packard Company into Hewlett Packard Enterprise Company and HP Inc. may have older product names and model numbers that differ from current models.

Sps printer driver
  • SPS-wide, schools enjoy tremendous volunteer support with over 20,000 individuals available to help. Unfortunately, some schools receive hundreds of volunteer applications while others only a few. On average., Title I schools receive 100 volunteer applications per year, compared to 250 for remaining schools.
  • SMAC Innovation Developer Business. Add to Wishlist. Translate the description into English (United States) using Google Translate?