1
0

Auto-commit: 2025-10-31 08:58:35

This commit is contained in:
David Wuibaille
2025-10-31 08:58:36 +01:00
parent 7d94414992
commit 7cc3011354
1088 changed files with 193455 additions and 0 deletions

View File

@@ -0,0 +1,62 @@
:: Supprimer la tâche planifiée "BiosUpdateAtStartup"
SCHTASKS /DELETE /TN "BiosUpdateAtStartup" /F
:: Define log file
set LOGFILE=c:\windows\temp\HPBiosUpdate.log
echo [%DATE% %TIME%] --------- BIOS update started ----------->> "%LOGFILE%"
:: Find the "sp156628" directory in the script folder
if exist "%~dp0sp156628" (
set BIOSFILE=sp156628
goto :found
)
echo [%DATE% %TIME%] ERROR: Directory "sp156628" not found in %~dp0 >> "%LOGFILE%"
exit /B 1
:found
set Fullpath=%~dp0%BIOSFILE%
echo [%DATE% %TIME%] --------- Full path = %Fullpath% ----------->> "%LOGFILE%"
del "%Fullpath%\HpFirmwareUpdRec*.log" /F /Q
rmdir /s /q "%Fullpath%\ldcacheinfo"
:: Log possible exit codes
(
echo [%DATE% %TIME%] 3010:SUCCESS:REBOOT=A restart is required to complete the install
echo [%DATE% %TIME%] 1602:CANCEL:NOREBOOT=The install cannot complete due to a dependency
echo [%DATE% %TIME%] 273:CANCEL:NOREBOOT=Flash did not update because update is same BIOS version
echo [%DATE% %TIME%] 282:CANCEL:NOREBOOT=Flash did not update because update is an older BIOS version
) >> "%LOGFILE%"
:: Execute BIOS update
echo [%DATE% %TIME%] Running HpFirmwareUpdRec64.exe >> "%LOGFILE%"
start /wait "bios" "%Fullpath%\HpFirmwareUpdRec64.exe" -s -r -h -b -f"%Fullpath%"
:: Retrieve exit code
set exitcode=%ERRORLEVEL%
echo [%DATE% %TIME%] Exit code = %exitcode% >> "%LOGFILE%"
:: Handle exit codes
if %exitcode% EQU 3010 (
echo [%DATE% %TIME%] BIOS update successful, restart required. >> "%LOGFILE%"
echo [%DATE% %TIME%] Restarting in 30 seconds... >> "%LOGFILE%"
shutdown /r /t 30 /c "BIOS update completed. Restarting in 30 seconds."
exit /B 0
)
if %exitcode% EQU 1602 (
echo [%DATE% %TIME%] Installation canceled: dependency issue. >> "%LOGFILE%"
exit /B 1602
)
if %exitcode% EQU 273 (
echo [%DATE% %TIME%] Update skipped: same BIOS version detected. >> "%LOGFILE%"
exit /B 273
)
if %exitcode% EQU 282 (
echo [%DATE% %TIME%] Update canceled: older BIOS version detected. >> "%LOGFILE%"
exit /B 282
)
del "%Fullpath%\HpFirmwareUpdRec*.log" /F /Q
echo [%DATE% %TIME%] Unknown error: exit code %exitcode%. >> "%LOGFILE%"
exit /B 99

View File

@@ -0,0 +1,60 @@
# 1) Define paths
$sourcePath = "$PSScriptRoot\*"
$destinationPath = "C:\Windows\Temp\Bios"
$logFiles = "$destinationPath\sp156628\HpFirmwareUpdRec*.log"
$cacheFolder = "$destinationPath\sp156628\ldcacheinfo"
# 2) Remove the target folder if it exists
if (Test-Path $destinationPath) {
Remove-Item -Path $destinationPath -Recurse -Force -ErrorAction SilentlyContinue
}
# 3) Recreate the target folder
New-Item -ItemType Directory -Path $destinationPath -Force | Out-Null
# 4) Copy files
Write-Host "Copying BIOS files to '$destinationPath'..."
Copy-Item -Path $sourcePath -Destination $destinationPath -Recurse -Force
# 5) Delete log files if they exist
if (Test-Path $logFiles) {
Remove-Item -Path $logFiles -Force -ErrorAction SilentlyContinue
}
# 6) Delete the ldcacheinfo folder if it exists
if (Test-Path $cacheFolder) {
Remove-Item -Path $cacheFolder -Recurse -Force -ErrorAction SilentlyContinue
}
# 7) Define the scheduled task name
$taskName = "BiosUpdateAtStartup"
Write-Host "Creating scheduled task '$taskName' to run the BIOS update at startup..."
# 8) Define the action: Run the script in silent mode
$scriptPath = "$destinationPath\BIOS_Update.bat"
if (-not (Test-Path $scriptPath)) {
Write-Host "Error: The file '$scriptPath' was not found!" -ForegroundColor Red
exit 1
}
$action = New-ScheduledTaskAction -Execute "cmd.exe" -Argument "/c `"$scriptPath`""
# 9) Set execution as SYSTEM with highest privileges
$principal = New-ScheduledTaskPrincipal -UserId "SYSTEM" -RunLevel Highest
# 10) Define the trigger with a 2-minute delay (ISO 8601: PT2M)
$trigger = New-ScheduledTaskTrigger -AtStartup
$trigger.Delay = "PT2M"
# 11) Check for and remove any existing task
if (Get-ScheduledTask -TaskName $taskName -ErrorAction SilentlyContinue) {
Write-Host "Existing task detected. Removing..."
Unregister-ScheduledTask -TaskName $taskName -Confirm:$false
}
# 12) Create and register the new scheduled task
$scheduledTask = New-ScheduledTask -Action $action -Trigger $trigger -Principal $principal
Register-ScheduledTask -TaskName $taskName -InputObject $scheduledTask | Out-Null
Write-Host "Scheduled task '$taskName' successfully created. It will run at startup with a 2-minute delay."

View File

@@ -0,0 +1,14 @@
# 🚀 BIOS Update Staged & Scheduled
## 🔧 What it does
- Copies the **entire folder** next to the script to `C:\Windows\Temp\Bios`
- Cleans previous **HpFirmwareUpdRec logs** and `ldcacheinfo`
- Creates a **scheduled task** `BiosUpdateAtStartup` that runs
`C:\Windows\Temp\Bios\BIOS_Update.bat` **at startup with a 2-minute delay** (as SYSTEM, highest)
## ✅ Prerequisites
- Run as **Administrator**
- Ensure `BIOS_Update.bat` exists in the source folder (it will be copied to `C:\Windows\Temp\Bios`)
- Include the HP package folder (e.g. `sp156628\...`) expected by `BIOS_Update.bat`
- Machine will execute the BIOS update **on next boot** via the scheduled task

Binary file not shown.

Binary file not shown.

View File

@@ -0,0 +1,394 @@
<html xmlns:v="urn:schemas-microsoft-com:vml"
xmlns:o="urn:schemas-microsoft-com:office:office"
xmlns:w="urn:schemas-microsoft-com:office:word"
xmlns:st1="urn:schemas-microsoft-com:office:smarttags"
xmlns="http://www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=Content-Type content="text/html; charset=windows-1252">
<meta name=ProgId content=Word.Document>
<meta name=Generator content="Microsoft Word 11">
<meta name=Originator content="Microsoft Word 11">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<title>HP Firmware Flash Update</title>
<o:SmartTagType namespaceuri="urn:schemas-microsoft-com:office:smarttags"
name="address"/>
<!--[if gte mso 9]><xml>
<o:DocumentProperties>
<o:Author> </o:Author>
<o:LastAuthor>Scott Sanders</o:LastAuthor>
<o:Revision>5</o:Revision>
<o:TotalTime>9</o:TotalTime>
<o:Created>2006-09-05T15:10:00Z</o:Created>
<o:LastSaved>2010-05-10T15:31:00Z</o:LastSaved>
<o:Pages>2</o:Pages>
<o:Words>1887</o:Words>
<o:Characters>10757</o:Characters>
<o:Company>HP Inc.</o:Company>
<o:Lines>89</o:Lines>
<o:Paragraphs>25</o:Paragraphs>
<o:CharactersWithSpaces>12619</o:CharactersWithSpaces>
<o:Version>12.00</o:Version>
</o:DocumentProperties>
</xml><![endif]-->
<!--[if gte mso 9]><xml>
<w:WordDocument>
<w:Zoom>145</w:Zoom>
<w:ValidateAgainstSchemas/>
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:BrowserLevel>MicrosoftInternetExplorer4</w:BrowserLevel>
</w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" LatentStyleCount="267">
</w:LatentStyles>
</xml><![endif]--><!--[if !mso]><object
classid="clsid:38481807-CA0E-42D2-BF39-B33AF135CC4D" id=ieooui></object>
<style>
st1\:*{behavior:url(#ieooui) }
</style>
<![endif]-->
<style>
<!--
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{mso-style-parent:"";
margin:0in;
margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"HP Simplified","Arial";
mso-fareast-font-family:"HP Simplified";
color:#000;}
h1
{mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
mso-pagination:widow-orphan;
mso-outline-level:1;
font-size:30.0pt;
font-family:"HP Simplified","Arial";
mso-fareast-font-family:"HP Simplified";
mso-fareast-theme-font:minor-fareast;
color:#007dba;
font-weight:bold;}
h2
{mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
mso-pagination:widow-orphan;
mso-outline-level:2;
font-size:18.0pt;
font-family:"HP Simplified","Arial";
mso-fareast-font-family:"HP Simplified";
mso-fareast-theme-font:minor-fareast;
color:#000;
font-weight:bold;}
h3
{mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
mso-pagination:widow-orphan;
mso-outline-level:3;
font-size:13.5pt;
font-family:"HP Simplified","Arial";
mso-fareast-font-family:"HP Simplified";
mso-fareast-theme-font:minor-fareast;
color:#000;
font-weight:bold;}
a:link, span.MsoHyperlink
{color:#007dba;}
a:visited, span.MsoHyperlinkFollowed
{color:#007dba;}
p
{mso-margin-top-alt:auto;
margin-right:0in;
mso-margin-bottom-alt:auto;
margin-left:0in;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"HP Simplified","Arial";
mso-fareast-font-family:"HP Simplified";
color:#000;}
@page Section1
{size:8.5in 11.0in;
margin:1.0in 1.25in 1.0in 1.25in;
mso-header-margin:.5in;
mso-footer-margin:.5in;
mso-paper-source:0;}
div.Section1
{page:Section1;}
/* List Definitions */
@list l0
{mso-list-id:576793600;
mso-list-template-ids:-2129070332;}
@list l0:level1
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
@list l0:level2
{mso-level-tab-stop:1.0in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level3
{mso-level-tab-stop:1.5in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level4
{mso-level-tab-stop:2.0in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level5
{mso-level-tab-stop:2.5in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level6
{mso-level-tab-stop:3.0in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level7
{mso-level-tab-stop:3.5in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level8
{mso-level-tab-stop:4.0in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l0:level9
{mso-level-tab-stop:4.5in;
mso-level-number-position:left;
text-indent:-.25in;}
@list l1
{mso-list-id:1843009106;
mso-list-template-ids:1886153374;}
@list l1:level1
{mso-level-number-format:bullet;
mso-level-text:\F0B7;
mso-level-tab-stop:.5in;
mso-level-number-position:left;
text-indent:-.25in;
mso-ansi-font-size:10.0pt;
font-family:Symbol;}
ol
{margin-bottom:0in;}
ul
{margin-bottom:0in;}
-->
</style>
<!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin:0in;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:10.0pt;
font-family:"HP Simplified","Arial";}
</style>
<![endif]--><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="4098"/>
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1"/>
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=white lang=EN-US link=blue vlink=blue style='tab-interval:.5in'>
<div class=Section1>
<table class=MsoNormalTable border=0 cellpadding=0 width="100%"
style='width:100.0%;mso-cellspacing:1.5pt;mso-yfti-tbllook:1184;mso-padding-alt:
0in 5.4pt 0in 5.4pt'>
<tr style='mso-yfti-irow:0;mso-yfti-firstrow:yes;mso-yfti-lastrow:yes'>
<td style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal align=center style='text-align:center'><span
style='mso-no-proof:yes'><img width=66 height=55 id="_x0000_i1040"
src=logo.bmp></span></p>
</td>
<td style='padding:.75pt .75pt .75pt .75pt'>
<h1 align=center style='text-align:center'><span style='mso-fareast-font-family:
"HP Simplified"'>Firmware Flash Update<o:p></o:p></span></h1>
</td>
<td style='padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal align=center style='text-align:center'><span
style='mso-no-proof:yes'><img width=66 height=55 id="_x0000_i1039"
src=logo.bmp></span></p>
</td>
</tr>
</table>
<div class=MsoNormal align=center style='text-align:center'>
<hr size=2 width="95%" align=center>
</div>
<p>This Firmware Update SoftPaq contains utilities and data files for restoring or upgrading the firmware on HP business notebooks and desktops. See below for descriptions of some of the supported methods.</p>
<div class=MsoNormal align=center style='text-align:center'>
<hr size=2 width="95%" align=center>
</div>
<span style='font-size:12.0pt;font-family:"HP Simplified","Arial";mso-fareast-font-family:
"HP Simplified";color:#007dba;mso-ansi-language:EN-US;mso-fareast-language:
EN-US;mso-bidi-language:AR-SA'>
<ul type=disc>
<li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
mso-list:l0 level1 lfo3;tab-stops:list .5in'><a href="#HPQWIN"><u>Firmware updates
in Microsoft Windows OS.</u></a> </li>
<li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
mso-list:l0 level1 lfo3;tab-stops:list .5in'><a href="#F10FLSH"><u>BIOS updates
from the (ESC) Startup Menu or (F10) BIOS Setup Utility.</u></a> </li>
<li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
mso-list:l0 level1 lfo3;tab-stops:list .5in'><a href="#BitL"><u>BIOS updates on a system using Windows Bitlocker
or BIOS measurements.</u></a> </li>
<li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
mso-list:l0 level1 lfo3;tab-stops:list .5in'><a href="#HPCMS"><u>Updating the
firmware with HP Client Management Solutions (HPCMS).</u></a> </li>
<li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
mso-list:l0 level1 lfo3;tab-stops:list .5in'><a href="#BB"><u>Recovering the
BIOS after a failed flash.</u></a> </li>
<li class=MsoNormal style='mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;
mso-list:l0 level1 lfo3;tab-stops:list .5in'><a href="history.txt"
target="_blank"><u>View revision history</u></a></li>
</ul>
<p></p>
</span>
<div class=MsoNormal align=center style='text-align:center'>
<hr size=2 width="95%" align=center>
</div>
<h2 align=center style='text-align:center'><a name=DESCRIP>General Information</a>
</h2>
<p>This package is used to update firmware locally or to provide files needed to deploy the firmware update to supported systems on a local network. The default Softpaq unbundle location is C:\SWSETUP\SPnnnnn\ where 'nnnnn' is the Softpaq number.</p>
<p>However the target systems may also use the internet to search for and apply the latest system firmware updates - check Windows Update to find new releases for supported firmware components. In addition the BIOS firmware can be updated directly from BIOS Setup (F10 hotkey at boot). Select the 'Update System BIOS' option under the Main menu to access this function. Under the 'BIOS Update Preferences' option you may set up periodic update checks, or you can use the 'Check HP.com for BIOS Updates' link to search for an update immediately.</p>
<div class=MsoNormal align=center style='text-align:center'>
<hr size=2 width="95%" align=center>
</div>
<h2 align=center style='text-align:center'><a name=HPQWIN>HP Firmware Update and Recovery (HpFirmwareUpdRec) Flash Utility</a></h2>
<p>The HP Firmware Update tool for use in Microsoft Windows operating systems is found in this package. To display the available options for this utility, enter [Path]\HpFirmwareUpdRec -? at a command prompt or local search box. If the system has a BIOS administrator password enabled, then HpFirmwareUpdRec will prompt for the password to be entered before completing the flash process. For more information, view <a href="contents.txt" target="_blank"><u>contents.txt</u></a> or <a href="HpFirmwareUpdRec.txt" target="_blank"><u>HpFirmwareUpdRec.txt</u></a>.</p>
<h3 align=left style='text-align:left'>Using a USB Device to run HpFirmwareUpdRec</a></h3>
<p>HpFirmwareUpdRec can also be run from a USB storage device, including flash memory devices and external hard drives. To do this insert the device and take note of the assigned drive letter. Run HpFirmwareUpdRec64.exe and choose the option to Create Recovery USB flash drive. Or you can manually copy the application .exe and the associated .bin file and .inf file to the root of the drive indicated by the drive letter or a folder on that drive. The update utility can then be executed from its location on the USB device. If the system has a BIOS Setup password enabled, then HpFirmwareUpdRec will prompt for the password to be entered before completing the flash process. For
more information, view <a href="contents.txt" target="_blank"><u>contents.txt</u></a>
or <a href="HpFirmwareUpdRec.txt" target="_blank"><u>HpFirmwareUpdRec.txt</u></a>.</p>
<p>Several HP models support more than one configuration, requiring a different BIOS family for each. In some cases the included version of the update utility packs both files together when creating BIOS Update USB key, which will not result in a successful update. You may avoid this problem by checking the system's BIOS version and family in the BIOS information page
(F1 or F10 key at boot) or using msinfo32.exe in Windows. Once you know the correct family for your system, delete the other 2 files in the Softpaq folder that do not match your system's BIOS. The folder default location is c:\swsetup\SP######.</p>
<div class=MsoNormal align=center style='text-align:center'>
<hr size=2 width="95%" align=center>
</div>
<h2 align=center style='text-align:center'><a name=F10FLSH>Startup Menu / F10
Setup Firmware Update</a></h2>
<p>The HP Business Desktop systems provide a firmware upgrade option through both the Startup Menu and the F10 Setup application. using the &quot;Update System BIOS&quot;
link.&nbsp; Reboot the PC and press the Esc key to display the Startup Menu. Select the &quot;Update System and Supported Device Firmware&quot; menu option directly for an immediate update from media (see below). &nbsp; Alternatively, select &quot;BIOS Setup (F10)&quot; or reboot and press F10 to access the BIOS Setup utility. In the Update System BIOS menu, select &quot;Update System and Supported Device Firmware Using Local Media&quot;.</p>
<p>These methods require that the firmware binary file is present on USB media or the hard drive in a specific folder - either &quot;HP\DEVFW&quot; or &quot;EFI\HP\DEVFW&quot; will support this feature. The file must be named 'firmware.bin'.
The HP Firmware Update and Recovery utility has a feature that will copy the image file to the correct folder on a USB device for you. &nbsp; If no firmware file is found on USB media, the system will look for a firmware file on the hard drive. &nbsp;
If a BIOS administrator password has been set, the password will be required before being able to access the &quot;Update System BIOS&quot; menu or BIOS Setup. &nbsp; The firmware update will not be complete until the system is restarted.</p>
<div class=MsoNormal align=center style='text-align:center'>
<hr size=2 width="95%" align=center>
</div>
<h2 align=center style='text-align:center'><a name=HPCMS>HP Client Management Solutions (HPCMS) BIOS Management</a></h2>
<p>Use this Softpaq with more Client Management Solutions from HP and other vendors to remotely target, distribute, and update the System BIOS and BIOS settings on network PCs. Refer to the chosen application's documentation for specific capabilities and instructions. For more information, see <a href="http://www.hp.com/go/clientmanagement" target="_blank"><u>HP Client Management Solutions</u></a> -> Additional Resources: HP Whitepapers.</p>
<div class=MsoNormal align=center style='text-align:center'>
<hr size=2 width="95%" align=center>
</div>
<h2 align=center style='text-align:center'><a name=BitL>BitLocker Drive Encryption / BIOS Measurements</a></h2>
<p>If you have Windows BitLocker Drive Encryption (BDE) enabled on your system, it is recommended that BDE be suspended temporarily before the BIOS is updated.
You should also obtain your BDE recovery password or recovery PIN before suspending BDE. After the BIOS is flashed, BDE can be resumed.</p>
<p>To make a change to BDE, select Start > Control Panel > BitLocker Drive Encryption, click 'Suspend Protection' or 'Resume Protection' and then click 'Yes'.</p>
<p>If you use HpFirmwareUpdRec to update your BIOS in Windows, the application will attempt to suspend Bitlocker for you while the firmware updates are in progress.</p>
<p>As a general rule, updating the BIOS will modify measurement values stored in the Platform Configuration Registers (PCRs) of the system's security module (TPM).
Technologies that use these PCR values to verify platform health (BDE is one such example) should be temporarily disabled prior to flashing the BIOS. Once the BIOS is updated, the functions should be re-enabled and the system should be restarted so that new measurements can be taken.</p>
<p>The primary measurement for BIOS code is stored in PCR 0. When the TPM is enabled, the value of PCR 0 after the system has been updated should match the value listed in the revision history (<a href="history.txt" target="_blank"><u>History.txt</u></a>).</p>
<div class=MsoNormal align=center style='text-align:center'>
<hr size=2 width="95%" align=center>
</div>
<h2 align=center style='text-align:center'><a name=BB>Crisis Recovery Mode</a></h2>
<p>In the event of a failed BIOS update (for example if power is lost while updating), the System BIOS may become corrupted. &nbsp;Crisis Recovery Mode detects this condition and will automatically attempt to recover to a known good state. Some advanced systems have the ability to recover without user intervention - an error response during boot up showing 2 red and then 4 white blinks on the power LED indicates this mode. After restoring the BIOS image, the system will reboot normally. If this feature is not present on your model, the recovery process will search the hard drive and any USB media sources for a compatible binary image. &nbsp;
The original factory image will have a suitable BIOS binary for automatic recovery without user intervention. Otherwise, the binary (.bin) file in the Softpaq root folder should be copied to the &quot;EFI\HP\BIOS\current&quot; folder of the desired storage device in a FAT or FAT32 partition, and the system powered on. Once the binary image is located, the BIOS will display a recovery screen and will start the recovery process. Do not power off the system until recovery is complete.</p>
<p>Whenever HpFirmwareUpdRec is used to update the firmware, the utility will automatically populate the recovery file in the correct location should the Tools partition or \EFI file path exist. This process can be used to configure for automatic recovery a system which has had the original hard drive image replaced or reinstalled with system software recovery media.</p>
<p>Sometimes there are restrictions on which BIOS versions are allowed to be installed on a platform. If the BIOS that was on
the system had restrictions, then only allowable BIOS versions may be used for recovery.</p>
<p>&nbsp;</p>
<div class=MsoNormal align=center style='text-align:center'>
<hr size=2 width="95%" align=center>
</div>
<p align=center style='text-align:center'>Copyright (c) 2025 HP Development Company, L.P. All Rights Reserved.<br>
Product names mentioned herein may be trademarks and/or registered trademarks
of their respective companies.</p>
</div>
</body>
</html>

View File

@@ -0,0 +1,462 @@
Revision History
S30 ROM Family
Models Supported: HP Engage One Pro AIO System
Version 02.22.00
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.25
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.8.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.8.0
Management Engine (ME) Firmware, version 14.1.75.2420
Intel UEFI PXE Driver, version 0.2.1
Realtek UEFI PXE Driver, version 2.041
ENHANCEMENTS:
-Enhancement to address security vulnerabilities CVE-2024-24853
-Enhancement to address security vulnerabilities CVE-2023-41833,CVE-2023-23904,CVE-2023-22351,CVE-2023-25546
-Enhancement to address security vulnerabilities CVE-2023-34424, CVE-2023-38655,CVE-2024-21844,CVE-2023-48361
-Enhancement to address security vulnerabilities CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, CVE-2023-45237
-Enhancement to address security vulnerabilities CVE-2024-5477
FIXES:
-Fixes the issue where the system shows the memory manufacturer information as "Unknow - [0X0B83]" in setup menu for memory option with Nanya (TM) 8G Memory .
PCR0(with TPM2.0 SHA256) = A301B32E762783083FCF07D63B60F3B5C461DAA2ED8C946AA315309555594866
Version 02.21.00
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.24
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.8.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.8.0
Management Engine (ME) Firmware, version 14.1.74.2355
Intel UEFI PXE Driver, version 0.2.1
Realtek UEFI PXE Driver, version 2.041
ENHANCEMENTS:
- Improve stability
FIXES:
- None
PCR0(with TPM2.0 SHA256) = FF48A97755D53621E8D5615AE03E12F718791FD86DED2BEAD6DE8563A735B494
Version 02.20.01
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.24
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.8.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.8.0
Management Engine (ME) Firmware, version 14.1.74.2355
Intel UEFI PXE Driver, version 0.2.1
Realtek UEFI PXE Driver, version 2.041
ENHANCEMENTS:
- Enhancement to address security vulnerabilities CVE-2024-24853
- Enhancement to address security vulnerabilities CVE-2023-41833, CVE-2023-23904, CVE-2023-22351, CVE-2023-25546
- Enhancement to address security vulnerabilities CVE-2023-34424, CVE-2023-38655, CVE-2024-21844, CVE-2023-48361
- Enhancement to address security vulnerabilities
CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, CVE-2023-45237
- Enhancement to address security vulnerabilities CVE-2024-5477
FIXES:
- Fixes the issue where the system shows the memory manufacturer information as "Unknow - [0X0B83]" in setup menu for memory option with Nanya (TM) 8G Memory .
PCR0(with TPM2.0 SHA256) = 4DA0FA18E1648C4262E0F3716E59AB61ABA9928B2D89B68BDEEC21A1E1B0F0A6
Version 02.20.00
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.23
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.8.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.8.0
Management Engine (ME) Firmware, version 14.1.74.2355
Intel UEFI PXE Driver, version 0.2.1
Realtek UEFI PXE Driver, version 2.041
ENHANCEMENTS:
- Enhancement to address security vulnerabilities CVE-2024-24853
- Enhancement to address security vulnerabilities CVE-2023-41833,CVE-2023-23904,CVE-2023-22351,CVE-2023-25546
- Enhancement to address security vulnerabilities CVE-2023-34424, CVE-2023-38655,CVE-2024-21844,CVE-2023-48361
- Enhancement to address security vulnerabilities
CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, CVE-2023-45237
FIXES:
- Fixes the issue where the system shows the memory manufacturer information as "Unknow - [0X0B83]" in setup menu for memory option with Nanya (TM) 8G Memory
PCR0(with TPM2.0 SHA256) = 786CE64EF93CBEBD990CEB5C7B5C9F06040810D08D17CD812454A778FAE7F3EA
Version 02.18.01
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.23
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.8.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.8.0
Management Engine (ME) Firmware, version 14.1.72.2287
Intel UEFI PXE Driver, version 0.2.1
Realtek UEFI PXE Driver, version 2.041
ENHANCEMENTS:
- Updates Intel MCU for compatibility enhancement
- Enhancement to address security vulnerabilities CVE-2023-32282
- Enhancement to address security vulnerabilities CVE-2023-28389, CVE-2023-27502 and CVE-2023-32633
- Enhancement to address security vulnerabilities CVE-2023-28402, CVE-2023-27504 and CVE-2023-28383
FIXES:
PCR0(with TPM2.0 SHA256) = 33985C5A7B32AF34B1B50F2310470EF6022F5DE3DCC76A0F46EF3C9FD22A855A
Version 02.17.01
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.23
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.8.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.8.0
Management Engine (ME) Firmware, version 14.1.70.2228
Intel UEFI PXE Driver, version 0.2.1
Realtek UEFI PXE Driver, version 2.041
ENHANCEMENTS:
- Enhancement to address security vulnerabilities CVE-2023-25756, CVE-2023-22329
- Enhancement to support SMBIOS type1 version string for 'db' addition.
- Enhancements to secure boot keys protection.
- HP strongly recommends updating system BIOS to address a potential issue with HP Sure Start that can cause some devices to experience a SecureBoot error at boot.
FIXES:
- Fixes issue where System cannot create POST Power-On Password when selecting "Create POST Power-On Password" and entering the pin provided by the "Phone App" after creating the BIOS Administrator Password with EBAM.
- Fixes issue where Power-On Authentication with fingerprint would not function.
- Fixes issue where FUR GUI would report “Incorrect password was entered” when flashing BIOS with correct password after setting EBAM and BIOS admin password.
PCR0(with TPM2.0 SHA256) = 2C5F850CD9826B6DA955972DF15874FB259D4E644FF84E3E47C370E51B225AE1
Version 02.16.20
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.23
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.8.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.8.0
Management Engine (ME) Firmware, version 14.1.70.2228
Intel UEFI PXE Driver, version 0.2.1
Realtek UEFI PXE Driver, version 2.025
ENHANCEMENTS:
FIXES:
- HP strongly recommends updating system BIOS to address a potential issue with HP Sure Start that can cause some devices to enter into an unrecoverable state.
PCR0(with TPM2.0 SHA256) = 5FBF73CD7D6BC55EB407E6E975BB27E7F0F78A46AC096CD4DD72BC1E8AB2DA83
Version 02.16.00
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.23
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.8.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.8.0
Management Engine (ME) Firmware, version 14.1.70.2228
Intel UEFI PXE Driver, version 0.2.1
Realtek UEFI PXE Driver, version 2.025
ENHANCEMENTS:
- Enhancement to address security vulnerabilities CVE-2022-40982
- Enhancement to address security vulnerabilities CVE-2022-43505, CVE-2022-44611
- Enhancement to address security vulnerabilities CVE-2022-29871, CVE-2022-36392
- Add "Network Boot TFTP Window Size" setting to F10/Public WMI
- Implement new feature to clear pw by RTC battery removal & add "Clear BIOS Passwords on RTC Battery Removal" under Security tab in F10.
- Integrate Infineon TPM EFI Driver v02.02.3776.00
FIXES:
- Fixes black screen issue on 23" under F10 by rollbacking GOP driver.
- Fixes an issue where KBC version format is not match in system information and release note.
PCR0(with TPM2.0 SHA256) = E700143450FFE0950F9F522535B8F6E1C2E39B21D245AB721FC4F8F82A303A46
Version 02.15.01
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.23
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.8.0
Intel GOP EFI Driver, version 9.0.1113.A.2
USB Type-C PD firmware FW 6.8.0
Management Engine (ME) Firmware, version 14.1.67.2046
Intel UEFI PXE Driver, version 0.0.24
Realtek UEFI PXE Driver, version 2.025
ENHANCEMENTS:
- Updates the Intel i225-V EFI Driver to 0.10.5 for compatibility enhancement
- Enhancement to address security vulnerabilities CVE-2022-33894
- Updates the Intel silicon MCU for compatibility enhancement
- Updates the Intel GOP EFI Driver to 9.0.1113 for compatibility enhancement
- Updates the PD firmware to 1.2 for the system USB-C power on compatibility Enhancement
- Enhancement to support new feature that POST error will indicate QR code and URL to the proper HP Support documentation.
- Add ExtendedDHCPTimeout support in BIOS setup menu.
- Enhancement to address security vulnerabilities CVE-2022-3602, CVE-2022-3786.
FIXES:
- Fixes issue where System cannot to create POST Power-On Password when select "Create POST Power-On Password" and enter the pin provided by the "Phone App" after creating the BIOS Administrator Password with EBAM.
PCR0(with TPM2.0 SHA256) = 6FD724D84980E7C778B69BF7AF33F9ACD90F505E0854796AA10E8210112B94DC
Version 02.14.00
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.23
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.8.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.8.0
Management Engine (ME) Firmware, version 14.1.67.2046
Intel UEFI PXE Driver, version 0.0.24
Realtek UEFI PXE Driver, version 2.025
ENHANCEMENTS:
- Enhancement to address security vulnerabilities CVE-2022-27541
- Enhance potentially ROM crash risk causes system no power and no LED lights.
- Enhancement to address security vulnerabilities CVE-2022-33894
- Enhancement to address security vulnerabilities CVE-2022-43777
- Enhancement to address security vulnerabilities CVE-2022-43778
- Updates the Intel silicon reference code for compatibility enhancement
- Enhancement to address security vulnerabilities CVE-2022-27539
- Add wireless 5GHz frequency supported for Indonesia
- Updates basic HP PC Hardware Diagnostics utility to 2.3.1.0.
FIXES:
- Fixes issue where BIOS Administrator password/Power on password can be accepted when the password length is less than Password Minimum Length.
- Fixes an issue where the user is unable to enter F10 BIOS menu via keyboard or unable to boot to USB storage if plug specific USB Cash Drawer.
PCR0(with TPM2.0 SHA256) = 2178FBFF9227737DB04DA4447758A6BB8C27F614E2B54ABDB4D3BF95B0EA7D44
Version 02.13.00
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.22
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.8.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.8.0
Management Engine (ME) Firmware, version 14.1.67.2046
Intel UEFI PXE Driver, version 0.0.24
Realtek UEFI PXE Driver, version 2.025
ENHANCEMENTS:
- Enhancement to address security vulnerabilities CVE-2022-21198
- Enhancement to address security vulnerabilities CVE-2022-26845, CVE-2022-29893, CVE-2022-27497, CVE-2022-33159
- Updates the CPU microcode for Intel processors for stability enhancement.
- Updates basic HP PC Hardware Diagnostics utility to 2.3.0.0.
- Enhancement to address security vulnerabilities CVE-2022-27541.
- Enhancement to address security vulnerabilities CVE-2022-27538.
FIXES:
PCR0(with TPM2.0 SHA256) = 75611466D169E589BDD5B5387492A0207E39FAC3B9DE2DFA97DF220F94FD7B6D
Version 02.12.01
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.22
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.8.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.8.0
Management Engine (ME) Firmware, version 14.1.65.1990
Intel UEFI PXE Driver, version 0.0.24
Realtek UEFI PXE Driver, version 2.025
ENHANCEMENTS:
- Add option "Second Power Button Startup Menu" to control boot to menu via power button.
- Enhancement to update Intel Management Engine firmware to 14.1.65.1990.
- Enhancement to improve connection stability when running HP Sure Recover.
- Enhancement to address security vulnerabilities CVE-2022-31644, CVE-2022-31645, CVE-2022-31646, CVE-2022-27537.
- Enhancement to address security vulnerabilities CVE-2022-31640, CVE-2022-31641, CVE-2022-31642.
- Enhancement to address security vulnerabilities CVE-2022-31635, CVE-2022-31636, CVE-2022-31637, CVE-2022-31638, CVE-2022-31639.
- Update Super IO 18.9 firmware to v9.8.22.
FIXES:
- Fixes an issue where sometimes D32- D38system shut down unexpectedly
- Fixes issue where system failure to boot on multiple boot entries with unique description.
PCR0(with TPM2.0 SHA256) = 988E44ADE2C9055DD50C30D505E5B7E266C25911FCA8E87E034641FF02BF79E6
Version 02.11.01
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.17
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.6.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.6.0
Management Engine (ME) Firmware, version 14.1.65.1969
Intel UEFI PXE Driver, version 0.0.24
Realtek UEFI PXE Driver, version 2.025
ENHANCEMENTS:
FIXES:
- Fixes issue unexpected system shutdown during system restart.
PCR0(with TPM2.0 SHA256) = E89DFB7CBC3A5E378A620E5CFD92D97CF9548ECFA75A094C415C933F675EE5FB
Version 02.11.00
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.17
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.6.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.6.0
Management Engine (ME) Firmware, version 14.1.65.1969
Intel UEFI PXE Driver, version 0.0.24
Realtek UEFI PXE Driver, version 2.025
ENHANCEMENTS:
- Adds Windows11 operating system support.
- Update Intel RST PreOS driver to to 18.31.3.5434
- Update Camera fw to enhance user experience.
- Enhancement to address security vulnerabilities CVE-2021-0091, CVE-2021-0156, CVE-2021-0157, CVE-2021-0158.
- Update PD Firmware to v6.6 for compatibility enhancement.- Enhancement to address security vulnerabilities CVE-2022-21166, CVE-2022-21123, CVE-2022-21151, CVE-2022-0005.
- Enhancement to address security vulnerabilities CVE-2021-33122.
- Remove physical presence interface pops up when changing the ""Intel Software Guard Extensions (SGX)"" setting from ""Software control"" to ""Disable"".
- Enhancement to address security vulnerabilities CVE-2022-23924, CVE-2022-23925, CVE-2022-23926, CVE-2022-23927, CVE-2022-23928, CVE-2022-23929, CVE-2022-23930, CVE-2022-23931, CVE-2022-23932, CVE-2022-23933, CVE-2022-23934.
- Enhancement to address security vulnerabilities CVE-2022-23953, CVE-2022-23954, CVE-2022-23955, CVE-2022-23956, CVE-2022-23957, CVE-2022-23958.
- Adds a feature to control display of BIOS Admin login based on ""BIOS Administrator visible at power-on authentication"" when Enhanced BIOS Authentication Mode (EBAM) is set.
- Enhancement to address security vulnerabilities CVE-2022-0004.
- Enhancement to address security vulnerabilities CVE-2021-33123, CVE-2021-33124, CVE-2021-33103.
FIXES:
- Fixes issue where hub was turned off automatically and all ports have no function during BIOS update.
- Fixes issue where Remote HP PC Diagnostics Execution Physical Presence Interface continuous occur when some specific settings are applied at the same time.
- Fixes issue where some F10 settings or help message display incomplete when change to non-English language.- Fixes an issue where system attempt to recover ME infinitely if customer deploy recover image via 3-party application
- Fixes an issue where TBT firmware display different fromat with Setup Menu during the BIOS update process via FUR (HP Firmware Update and Recovery).
- Fixes an issue where system cannot boot to OS while 3-rd party audio card installed (Digigram VX222e)
- Fixes issue where system failure to boot after switching between two different saved bootstores.
PCR0(with TPM2.0 SHA256) = 94DF17E3A4E2409459ED282678364B7187CC48EFD43C515E1E27627A4E4DF035
Version 02.10.10
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.17
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.6.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.6.0
Management Engine (ME) Firmware, version 14.1.60.1807
Intel UEFI PXE Driver, version 0.0.24
Realtek UEFI PXE Driver, version 2.025
ENHANCEMENTS:
- Enhancement to address security vulnerabilities CVE-2022-23924, CVE-2022-23925, CVE-2022-23926, CVE-2022-23927, CVE-2022-23928, CVE-2022-23929, CVE-2022-23930, CVE-2022-23931, CVE-2022-23932, CVE-2022-23933, CVE-2022-23934.
- Enhancement to address security vulnerabilities CVE-2022-23953, CVE-2022-23954, CVE-2022-23955, CVE-2022-23956, CVE-2022-23957, CVE-2022-23958.
- Adds a feature to control display of BIOS Admin login based on "BIOS Administrator visible at power-on authentication" when Enhanced BIOS Authentication Mode (EBAM) is set.
FIXES:
- Fixes issue where system would fail to boot after switching between two different saved bootstores.
PCR0(with TPM2.0 SHA256) = E7A325FADB8C69FE4D73F8BE665CF8E2223D98F6896C812D2B2F32F43C3BE952
Version 02.10.00
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.17
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.6.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.6.0
Management Engine (ME) Firmware, version 14.1.60.1807
Intel UEFI PXE Driver, version 0.0.24
Realtek UEFI PXE Driver, version 2.025
ENHANCEMENTS:
- Updates Intel ME Firmware 14.1.60.1807.
- Enhancement to address security vulnerabilities CVE-2021-33107.
- Enhancement to address security vulnerabilities CVE-2021-0103, CVE-2021-0107, CVE-2021-0111, CVE-2021-0114, CVE-2021-0115, CVE-2021-0116, CVE-2021-0117, CVE-2021-0118, CVE-2021-0119, CVE-2021-0124, CVE-2021-0125.
- Enhancement to address security vulnerabilities CVE-2021-0127.
- Enhancement to address security vulnerabilities CVE-2021-39297, CVE-2021-39299, CVE-2021-39300, CVE-2021-39301.
- Disable Turbo Boost as BIOS default setting.
FIXES:
PCR0(with TPM2.0 SHA256) = 8CF3A8FE3C687F2AF14FE31735DE7A6CE08386A5DEECB2FD9878B1180ADD7AE8
Version 02.09.00
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.17
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.6.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.6.0
Management Engine (ME) Firmware, version 14.1.53.1649
Intel UEFI PXE Driver, version 0.0.24
Realtek UEFI PXE Driver, version 2.025
ENHANCEMENTS:
- Adds Windows11 operating system support.
- Update Intel RST PreOS driver to 18.31.3.5434
- Update Camera fw to enhance user experience.
- Enhancement to address security vulnerabilities CVE-2021-0091, CVE-2021-0156, CVE-2021-0157, CVE-2021-0158.
- Update PD Firmware to v6.6 for compatibility enhancement.
FIXES:
- Fixes issue where hub would automatically turn off and all ports would lose functionality during BIOS update.
- Fixes issue where Remote HP PC Diagnostics Execution Physical Presence Interface continuously occurred when some specific settings are applied at the same time.
- Fixes issue where some F10 settings or help messages display incomplete when system is changed to a non-English languag
PCR0(with TPM2.0 SHA256) = B6CAB34E18600F06E732D1E9F413FCD84ECF1971BD9270D553399FE1B8AE5C45
Version 02.08.01
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.17
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.3.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.3.0
Management Engine (ME) Firmware, version 14.1.53.1649
Intel UEFI PXE Driver, version 0.0.24
Realtek UEFI PXE Driver, version 2.025
ENHANCEMENTS:
- Adds support for Intel Pyramid Glacier.
- Updates HP Firmware Update and Recovery tool to v2.0.31.1 to fix issue where current and new versions are reversed.
FIXES:
- Fixes issue where some F10 settings or help messages would not display completely when changing language to non-English language.
- Fixes issue where Power On Password cannot be cleared after selecting 'Restore Security Settings to Factory Defaults' with Sure Admin enabled.
- Fixes issue where an error message pops up (0x8007054F) while enabling Power-On Authentication if user account name exceeds 11 characters.
- Fixes issue where Intune service would report that the TCG device is 'NOT COMPLIANT'.
- Fixes issue where PCR7 Configuration is 'Binding Not Possible' while Intel Management Engine is "permanently disable"
PCR0(with TPM2.0 SHA256) = 8203A5D3CFE78642F92F617F36F6E114DD0C1268BF73543A81984B5A11142507
Version 02.02.01
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.17
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 6.3.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 6.3.0
Management Engine (ME) Firmware, version 14.1.53.1649
Intel UEFI PXE Driver, version 0.0.24
Realtek UEFI PXE Driver, version 2.025
-Update Intel Reference code to 09.00.45.10
-Update Intel MRC to 0.0.0.75
-Update Intel Microcode to 0xE4/0xE6.
-Update Super IO to 09.08.17
-Update Management Engine (ME) Firmware, version to 14.1.53.1649
-Update Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C to 6.3.0
-Update Adjust minimum brightness for 23.8" panel
-Enhanced CVE-2020-24506, CVE-2020-24507, CVE-2020-8703, CVE-2020-8704, CVE-2020-24512, CVE-2020-24511, CVE-2020-12359, CVE-2020-8700
PCR0(with TPM2.0 SHA256) = 3FB6FE2357C5D778C5E45CBE4BACE8DF284BEE54A2179F4A08D56A6AD91E7CDA
Version 02.01.00
This BIOS upgrade package also includes the following firmware versions: (only list appropriate ones)
SIO Firmware, version 09.08.14
Cypress Power Delivery (PD) Firmware (CCG5),Cypress - CCG5C: 5.8.0
Intel GOP EFI Driver, version 9.0.1107.A.11
USB Type-C PD firmware FW 5.8.0
Management Engine (ME) Firmware, version 14.0.45.1389
Intel UEFI PXE Driver, version 0.0.24
Realtek UEFI PXE Driver, version 2.025
- Initial BIOS release.
PCR0(with TPM2.0 SHA256) = C24CCDCAD861B65C4C89415ED0A2047E4CC53CCA022FA7F5C8304DB817B16C23

Binary file not shown.

View File

@@ -0,0 +1,84 @@
HP Firmware Update and Recovery
The purpose of the HP Firmware Update and Recovery Utility is to provide a method for end-users
to update the system BIOS, ME (Intel only), and other supported firmware on a system running MS Windows.
NOTES:
1. [Path]\HPFIRMWAREUPDREC -? will display the available options for this utility.
2. If the system has a BIOS Setup password enabled, then HPFIRMWAREUPDREC will prompt
for the password to be entered before completing the update process.
USAGE:
1. Close all other applications before launching HPFIRMWAREUPDREC. The system will
restart to apply the update.
2. Open the folder containing the application and firmware binary file. Double-click
on the HPFIRMWAREUPDREC icon.
3. HPFIRMWAREUPDREC will inform the user that a firmware update is about to occur.
4. The version of the firmware image in the binary file and the version of the
current system firmware are displayed. Once OK is selected the system will restart
to begin the update process.
5. Upon completion, the user is notified that the firmware update was successful.
Select Restart.
6. On restart, you may see the firmware performing the final update, and the system
may reset several times before loading the operating system.
7. When the system starts Windows, the system firmware update is complete.
ADVANCED USAGE:
1. Close all other applications before launching HPFIRMWAREUPDREC.
2. On the Windows Task Bar select Start, then Run, and enter
the following on the command line:
[Path]\HPFIRMWAREUPDREC -f[bin file]
3. HPFIRMWAREUPDREC will inform the user that a firmware update is about to occur.
4. The version of the firmware image in the [bin file] and the version of the
current system firmware are displayed. Once OK is selected the system will
restart to begin the update process.
5. Upon completion, the user is notified that the firmware update was successful.
Select Restart.
6. On restart, you may see the firmware performing the final update, and the system
may reset several times before loading the operating system.
7. When the system starts Windows, the system firmware update is complete.
Command Line Options
-fBIN-file Specifies the path to the .BIN image file, and does not change the <20>working
directory?from the location of the utility. Default is *.BIN in the executable
folder. Valid with all other options.
-ppassword-file Specify encrypted password file created with the HpqPswd utility. Valid with
all other options.
-s Silent mode. Suppresses all output.
-a Eliminates version comparison when -s is present. It is ignored otherwise. There
is no log entry or usage dialog if it appears without the silent option.
-b If BitLocker with TPM is in use, automatically suspend it.
-? Show the same usage dialog that appears if an invalid command line is detected.
This options overrides all other options, including -s.
Copyright (c) 2019 HP Development Company, L.P.
Product names mentioned herein may be trademarks and/or registered trademarks
of their respective companies.

Binary file not shown.

Binary file not shown.

View File

@@ -0,0 +1,29 @@
HP Password Encryption Utility Client Usage Guide
HPQPswd is a utility for saving a BIOS Setup Password to an encrypted file.
This file can be provided to HP BIOS update utilities for automated scripting,
to avoid user prompting.
Command Line Switches
Command Result
-p"password" BIOS Setup Password to encrypt. Quotes are optional.
-f"filename" File pathname to create. Quotes are optional.
-s Silent mode. Requires <20>p and <20>f options.
-? Show usage.
Requirements:
- AES 256 encryption is used.
- User interface prompts for password, verification, and destination file.
- Browse supported for file location.
- Command line options are provided to support automated silent mode execution.
- No dependencies on other software.
- Support password max length of 32 Unicode characters.
Copyright (c) 2019 HP Development Company, L.P.
Product names mentioned herein may be trademarks and/or registered trademarks
of their respective companies.

Binary file not shown.

Binary file not shown.

View File

@@ -0,0 +1,57 @@
; Copyright (C) 2024 HP Development Company. L.P. All Rights Reserved.
[Version]
Signature = "$WINDOWS NT$"
Provider = %Provider%
Class = Firmware
ClassGuid = {f2e7dd72-6468-4e36-b6f1-6488f42c1b52}
DriverVer = 12/30/2024,2.22.0.0
CatalogFile = S30_02220000.cat
PnpLockdown = 1
[Manufacturer]
%MfgName% = Firmware,NTx86, NTamd64, NTarm
[Firmware.NTx86]
%FirmwareDesc% = Firmware_Install,UEFI\RES_{45518414-ff98-4d79-a2b6-ac718e0d1909}
[Firmware.NTamd64]
%FirmwareDesc% = Firmware_Install,UEFI\RES_{45518414-ff98-4d79-a2b6-ac718e0d1909}
[Firmware.NTarm]
%FirmwareDesc% = Firmware_Install,UEFI\RES_{45518414-ff98-4d79-a2b6-ac718e0d1909}
[Firmware_Install.NT]
CopyFiles = Firmware_CopyFiles
[Firmware_CopyFiles]
S30_02220000.bin
[Firmware_Install.NT.Hw]
AddReg = Firmware_AddReg
[Firmware_AddReg]
HKR,,FirmwareId,,{45518414-ff98-4d79-a2b6-ac718e0d1909}
HKR,,FirmwareVersion,%REG_DWORD%,0x02160000
HKR,,FirmwareFilename,,{45518414-ff98-4d79-a2b6-ac718e0d1909}\S30_02220000.bin
[SourceDisksNames]
1 = %DiskName%
[SourceDisksFiles]
S30_02220000.bin = 1
[DestinationDirs]
DefaultDestDir = %DIRID_WINDOWS%,Firmware\{45518414-ff98-4d79-a2b6-ac718e0d1909} ; %SystemRoot%\Firmware
[Strings]
; localizable
Provider = "HP Inc."
MfgName = "HP Inc."
FirmwareDesc = "HP S30 System Firmware"
DiskName = "Firmware Update"
; non-localizable
DIRID_WINDOWS = 10
REG_DWORD = 0x00010001

View File

@@ -0,0 +1,32 @@
FILES INCLUDED IN THIS PACKAGE:
Bios Flash.htm (How to Use documentation)
History.txt (Softpaq release history)
HPFIRMWAREUPDREC.exe
HPFIRMWAREUPDREC64.exe
HPFIRMWAREUPDREC.txt
HpqPswd.exe
HpqPswd64.exe
HpqPswd.txt
contents.txt (this file)
xxx_xxxxxx.bin (firmware image file)
xxx_xxxxxx.inf (firmware install map)
license.txt (copy of Softpaq license text)
BCUsignature32.dll
BCUsignature64.dll
HpFirmwareUpdRec.exe - A utility to locally update the system firmware on
individual systems in Microsoft Windows.
HpFirmwareUpdRec64.exe - 64-bit version of HpFirmwareUpdRec.exe
HPQ Password Utility - HPQPswd is a utility for saving a BIOS Setup Password to
an encrypted file. This file is provided to HP firmware update
utilities for automated scripting to avoid user prompting.
Copyright (c) 2020 HP Development Company, L.P.
Product names mentioned herein may be trademarks and/or registered trademarks
of their respective companies.

View File

@@ -0,0 +1,49 @@
PLEASE READ CAREFULLY BEFORE USING THIS SOFTWARE OR SOFTWARE AVAILABLE ON AN HP PRODUCT:
This End-User license Agreement ("EULA") is a legal agreement between (a) you (either an individual or a single entity) and (b) HP Inc. ("HP") that governs your use of any Software Product, installed on or made available by HP for use as a standalone product or with your HP product ("HP Product") that is not otherwise subject to a separate license agreement between you and HP or its suppliers. The term "Software Product" includes application software, firmware, operating systems, drivers, and any other types of software and may include associated media, printed materials, and online or electronic documentation.
AN AMENDMENT OR ADDENDUM TO THIS EULA MAY ACCOMPANY THE HP PRODUCT OR THE SOFTWARE PRODUCT. IN THE EVENT OF A CONFLICT BETWEEN ANY SUCH AMENDMENT OR ADDENDUM AND THIS EULA, THE TERMS OF THE AMENDMENT OR ADDENDUM SHALL CONTROL.
RIGHTS IN THE SOFTWARE PRODUCT ARE OFFERED ONLY ON THE CONDITION THAT YOU AGREE TO ALL TERMS AND CONDITIONS OF THIS EULA. BY INSTALLING, COPYING, DOWNLOADING, OR OTHERWISE USING THE SOFTWARE PRODUCT, YOU AGREE TO BE BOUND BY THE TERMS OF THIS EULA. IF YOU DO NOT ACCEPT THESE LICENSE TERMS, YOUR SOLE REMEDY IS TO RETURN THE ENTIRE UNUSED PRODUCT (HARDWARE AND SOFTWARE) WITHIN 14 DAYS FOR A REFUND SUBJECT TO THE REFUND POLICY OF YOUR PLACE OF PURCHASE.
THIS EULA IS A GLOBAL AGREEMENT AND IS NOT SPECIFIC TO ANY PARTICULAR COUNTRY, STATE OR TERRITORY. IF YOU ACQUIRED THE HP PRODUCT OR THE SOFTWARE PRODUCT AS A CONSUMER WITHIN THE MEANING OF RELEVANT CONSUMER LEGISLATION IN YOUR COUNTRY, STATE OR TERRITORY, THEN DESPITE ANYTHING TO THE CONTRARY IN THIS EULA, NOTHING IN THIS EULA AFFECTS ANY NON-EXCLUDABLE STATUTORY RIGHTS OR REMEDIES THAT YOU MAY HAVE UNDER SUCH CONSUMER LEGISLATION; THIS EULA IS SUBJECT TO THOSE RIGHTS AND REMEDIES.
1. GRANT OF LICENSE. HP grants you the following rights provided you comply with all terms and conditions of this EULA:
a. Use. You may use the Software Product on a single HP Product. If the Software Product is provided to you via the internet and was originally licensed for use on more than one HP Product, you may install and use the Software Product only on those HP Products. You may not separate component parts of the Software Product for use on more than one HP Product. You do not have the right to distribute the Software Product. You may load the Software Product into your HP Products temporary memory (RAM) for purposes of using the Software Product.
b. Storage. You may copy the Software Product into the local memory or storage device of the HP Product.
c. Copying. You may make archival or back-up copies of the Software Product, provided the copy contains all of the original Software Product's proprietary notices and that it is used only for back-up purposes.
d. Reservation of Rights. To the maximum extent permitted by applicable law, HP and its suppliers reserve all rights not expressly granted to you in this EULA.
e. Freeware. Notwithstanding the terms and conditions of this EULA, all or any portion of the Software Product which constitutes non-proprietary HP software or software provided under public license by third parties ("Freeware"), is licensed to you subject to the terms and conditions of the software license agreement accompanying such Freeware whether in the form of a discrete agreement, shrink wrap license or electronic license terms accepted at time of download. Use of the Freeware by you shall be governed entirely by the terms and conditions of such license.
f. Recovery Solution. Any software recovery solution provided with/for your HP Product, whether in the form of a hard disk drive-based solution, an external media-based recovery solution (e.g. CD or DVD) or an equivalent solution delivered in any other form, may only be used for restoring the hard disk of the HP Product with/for which the recovery solution was originally purchased. The use of any Microsoft operating system software contained in such recovery solution shall be governed by the Microsoft License Agreement.
2. UPGRADES. To use a Software Product identified as an upgrade, you must first be licensed for the original Software Product identified by HP as eligible for the upgrade. After upgrading, you may no longer use the original Software Product that formed the basis for your upgrade eligibility as a separate Software Product.
3. ADDITIONAL SOFTWARE. This EULA applies to updates or supplements to the original Software Product provided by HP unless HP provides other terms along with the update or supplement. In case of a conflict between such terms, the other terms will prevail.
4. TRANSFER.
a. Third Party. The initial user of the Software Product may make a one-time transfer of the Software Product to another end user. Any transfer must include all component parts, media, printed materials, this EULA, and if applicable, the Certificate of Authenticity. The transfer may not be an indirect transfer, such as a consignment. Prior to the transfer, the end user receiving the transferred product must agree to all the EULA terms. Upon transfer of the Software Product, your license is automatically terminated.
b. Restrictions. You may not rent, lease, or lend the Software Product or use the Software Product for commercial timesharing or bureau use. You may not sublicense, assign, or transfer the license or Software Product except as expressly provided in this EULA.
5. PROPRIETARY RIGHTS. All intellectual property rights in the Software Product and user documentation are owned by HP or its suppliers and are protected by law, including but not limited to United States copyright, trade secret, and trademark law, as well as other applicable laws and international treaty provisions. You shall not remove any product identification, copyright notices, or proprietary restrictions from the Software Product.
6. LIMITATION ON REVERSE ENGINEERING. You may not reverse engineer, decompile, or disassemble the Software Product, except and only to the extent that the right to do so is mandated under applicable law notwithstanding this limitation or it is expressly provided for in this EULA.
7. TERM. This EULA is effective unless terminated or rejected. This EULA will also terminate upon conditions set forth elsewhere in this EULA or if you fail to comply with any term or condition of this EULA.
8. NOTICE OF DATA COLLECTION. HP and its affiliates may collect, combine, and use device and individual user information you provide in relation to support services related to the Software Product. HP will not use this information to market to you without your consent. Learn More about HP data collection practices at www.hp.com/go/privacy.
9. DISCLAIMER OF WARRANTIES. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, HP AND ITS SUPPLIERS PROVIDE THE SOFTWARE PRODUCT "AS IS" AND WITH ALL FAULTS, AND HEREBY DISCLAIM ALL OTHER WARRANTIES, DUTIES AND CONDITIONS, EITHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING, BUT NOT LIMITED TO, WARRANTIES: (i) OF FITNESS FOR A PARTICULAR PURPOSE; (ii) OF MERCHANTABILITY; (iii) OF TITLE, (iv) OF NONINFRINGEMENT, (v) THAT THE SOFTWARE PRODUCT WILL FUNCTION WITH NON-HP SUPPLIES OR ACCESSORIES; AND (vi) OF LACK OF VIRUSES ALL WITH REGARD TO THE SOFTWARE PRODUCT. Some states/jurisdictions do not allow exclusion of implied warranties or limitations on the duration of implied warranties, so the above disclaimer may not apply to you in its entirety.
10. LIMITATION OF LIABILITY. Subject to local law, notwithstanding any damages that you might incur, the entire liability of HP and any of its suppliers under any provision of this EULA and your exclusive remedy for all of the foregoing shall be limited to the greater of the amount actually paid by you separately for the Software Product or U.S. $5.00. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL HP OR ITS SUPPLIERS BE LIABLE FOR (A) ANY LOSS OF PROFITS, BUSINESS, REVENUE, ANTICIPATED SAVINGS, GOODWILL, DATA, OR CONTRACTS, (B) ANY TYPE OF SPECIAL, INCIDENTAL, INDIRECT, OR CONSEQUENTIAL DAMAGES WHATSOEVER, (C) BUSINESS INTERRUPTION, (D) PERSONAL INJURY, OR (E) LOSS OF PRIVACY, ARISING OUT OF OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE PRODUCT, OR OTHERWISE IN CONNECTION WITH ANY PROVISION OF THIS EULA, EVEN IF HP OR ANY SUPPLIER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES AND EVEN IF THE REMEDY FAILS OF ITS ESSENTIAL PURPOSE. Some states/jurisdictions do not allow the exclusion or limitation of incidental, consequential, product liability, or certain direct damages, so the above limitation or exclusion may not apply to you.
11. U.S. GOVERNMENT CUSTOMERS. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under HP's standard commercial license.
12. COMPLIANCE WITH EXPORT LAWS. You shall comply with all laws and regulations of the United States and other countries ("Export Laws") to assure that the Software Product is not (1) exported, directly or indirectly, in violation of Export Laws, or (2) used for any purpose prohibited by Export Laws, including, without limitation, nuclear.
13. CAPACITY AND AUTHORITY TO CONTRACT. You represent that you are of the legal age of majority in your state or country of residence and, if applicable, you are duly authorized by your employer to enter into this contract.
14. APPLICABLE LAW. If the Software Product is provided as part of an HP Product, this EULA is governed by the laws of the country, state, or territory in which the HP Product was purchased. If the Software Product is being licensed to you as a standalone product, this EULA is governed by the laws of the State of California, U.S.A.
15. ENTIRE AGREEMENT. This EULA (including any addendum or amendment to this EULA which is included with the HP Product) is the entire agreement between you and HP relating to the Software Product, and this EULA supersedes all prior or contemporaneous oral or written communications, proposals, and representations with respect to the Software Product or any other subject matter covered by this EULA. To the extent the terms of any HP policies or programs for support services conflict with the terms of this EULA, the terms of this EULA shall control. Should any term, condition or provision of this EULA be held invalid or unenforceable as to any party or circumstance, such ruling shall not affect the validity and enforceability of the remaining terms, conditions, and provisions of this EULA.
16. CONSUMER RIGHTS. Consumers in some countries, states, or territories may have the benefit of certain statutory rights, remedies, localizations, and limitations under consumer legislation in respect of which HPs liability cannot lawfully be excluded or limited. Notwithstanding anything to the contrary in this EULA, if you acquired the HP Product or licensed the Software Product as a consumer within the meaning of relevant consumer legislation in your country, state, or territory, the provisions of this EULA (including the disclaimers of warranties, limitations and exclusion of liability) must be read subject to applicable law and apply only to the maximum extent permitted by such applicable law. For example:
AUSTRALIA: If you acquired the Software Product as a consumer within the meaning of the Australian Consumer Law under the Australian Competition and Consumer Act 2010 (Cth), then despite any other provision of this EULA:
(1) The Software Product comes with guarantees that cannot be excluded under the Australian Consumer Law, including that goods will be of acceptable quality and services will be supplied with due care and skill. If HP fails to comply with any such consumer guarantee, HPs or HPs licensors liability is limited to the following:
(A) in connection with the provision of warranty and support services for the Software Product, to any one or more of the following (at HPs discretion): (i) the supplying of the services again; or (ii) the payment of the costs of having the services supplied again; and
(B) in connection with the provision of the Software Product, to any one or more of the following (at HPs discretion): (i) the replacement of the Software Product or the supply of equivalent software; (ii) the repair of the Software Product; (iii) the payment of the costs of replacing the Software Product or of acquiring equivalent software; or (iv) the payment of the costs of having the Software Product repaired; and
(C) otherwise, to the maximum extent permitted by law;
(2) Nothing in this EULA excludes, restricts, or modifies any right or remedy, or any guarantee, warranty, or other term or condition implied or imposed by the Australian Consumer Law which cannot be lawfully excluded or limited; and
(3) The benefits provided to you by the warranties in this EULA are in addition to other rights and remedies available to you under applicable law in relation to the goods or services to which the warranty relates.
If you think that you are entitled to any warranty under this EULA or any of the above remedies, please contact HP at:
HP PPS Australia Pty Ltd
353 Burwood Hwy
Forest Hill
VIC 3131
Australia
To initiate a support request or warranty claim, please call 13 10 47 (within Australia) or +61 2 8278 1039 (if dialing internationally) or visit www.hp.com.au and select the “Customer Service” option for the most current list of phone support numbers.
NEW ZEALAND: If you are purchasing goods for personal, domestic or household use or consumption and not for the purpose of a business as a New Zealand consumer, you are entitled to repair, replacement, or refund for a failure, as well as compensation for other reasonably foreseeable loss or damage as a result of the failure.
© Copyright 2015, 2021 HP Development Company, L.P.
The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
Third Edition: June 2021
First Edition: August 2015
Document Part Number: 817678-003

Binary file not shown.

After

Width:  |  Height:  |  Size: 14 KiB