• ×
    Information
    Need Windows 11 help?
    Check documents on compatibility, FAQs, upgrade information and available fixes.
    Windows 11 Support Center.
  • post a message
  • ×
    Information
    Need Windows 11 help?
    Check documents on compatibility, FAQs, upgrade information and available fixes.
    Windows 11 Support Center.
  • post a message
Guidelines
Are you having HotKey issues? Click here for tips and tricks.
HP Recommended
EliteDesk 800 G2
Microsoft Windows 10 (64-bit)

On checking the product page for updates we found that the system BIOS we downloaded last year from the website and are using on a few hundred devices has vanished.

 

Strangely not only that release but also the previous 9 releases vanished form the product page.

Does anybody can shed some light on this.

 

Following the versions missing from the product page, which are listed in the revision history which came with the BIOS update SP we are currently using:

 

 

Version 2.47
Version 2.45
Version 2.44
Version 2.43
Version 2.42
Version 2.39
Version 2.37
Version 2.36
Version 2.35

 

 

 

 

The current version on the product page is 2.35

1 ACCEPTED SOLUTION

Accepted Solutions
HP Recommended

Seems that HP has fixed the issue meanwhile.

Now version 2.53 from May 2021 is available.

 

2021-06-04 19-29-54.png

 

View solution in original post

10 REPLIES 10
HP Recommended

Interesting.  I looked at the support page for the BIOS on the EliteDesk 800 G2 tower and SFF which have previous versions listed.  Not exactly as listed in your post but many more versions.

https://support.hp.com/us-en/drivers/selfservice/hp-elitedesk-800-g2-tower-pc/7633297

When the current BIOS version is clicked on (version 2.51), there is a "Previous version" tab beneath the "Associated files" tab.  Click on that and many previous versions will show up.

I see you are from Germany, so I do not know if what we see in the USA is different than in your area/region, but the link I posted is USA origin.


I'm not an HP employee.
Did this message answer your question? Please indicate below as an Accepted Solution!
Did you find this message useful? Click on the "Was this reply helpful" Yes button.
HP Recommended

Hello TheOldMan.

 

THX a lot for you answer.

I have to apologize in being imprecise with my inital post.

We have the problem described with the Desktop-Mini variant.

Indeed the tower page shows newer BIOS versions but these are not compatible with the DM.

Have a look here for the DM version Link 

HP Recommended

Yes, the Mini has different BIOS and it seems that 2.35 is the latest.

You might want to check with the Business Class support.

https://support.hp.com/us-en/products/business-solutions-software


I'm not an HP employee.
Did this message answer your question? Please indicate below as an Accepted Solution!
Did you find this message useful? Click on the "Was this reply helpful" Yes button.
HP Recommended

Hi TheOldMan.

 

Thanks again for trying to help.

I tried to contact HP support but I gave up.

Strangely they even do not seem to be able to understand the problem or being of any help.

 

"The BIOS update on the website is outdated and the latest 9 versions have vanished".

 

Not to hard to understand I think.

 

Cheers.

 

HP Recommended

And just for the record I post the revision history of the BIOS where it is quite easy to see that the version on the website is very very very very old.

 

				Revision History
				 N21 ROM Family


Models Supported:       HP EliteDesk 800 G2 DM 65W Business PC
			HP EliteDesk 800 G2 DM 35W Business PC
                        HP MP9 G2 Retail System
Version 2.47
-Enhancement to address security vulnerabilities CVE-2020-0528.

              PCR0(TPM1.2)  	      = 5F8EF5706F8A4E87A5EDC9412A81E19399298317  
              PCR0(TPM2.0 SHA1)	      =	6F3B8409D13F91FF3FDB8CBE9E2D58BA3DF2D431	
              PCR0(TPM2.0 SHA256)     = DEE1E918FCD77090233F7FFE50874BA25AFF9D85D53E6592F7269C2E1B989A67

Version 2.45
- Fixes issue where system spends much time when resume from hibernation if connected with NVMe drive with legacy OS.
- Fixes issue where system BIOS fails to be updated and reported ""Failed to determine if new BIOS is available"" if without setting of Proxy Server in F10 setup interface.
- Updates the CPU microcode for Intel processors to 0xD6.

              PCR0(TPM1.2)  	      = 1B6EEA86FB9D36E404E1DE9B308CF41206745E3E  
              PCR0(TPM2.0 SHA1)	      =	217D32E94077C03914B1B08B3C25837B12873336	
              PCR0(TPM2.0 SHA256)     = 09747DFA4B7A813186F46086C7330EAB873E2729ADC5031AEF620FFDE057E73F

Version 2.44
-Fixes issue where specific SanDisk USB drive is not listed in F9 Boot Menu.
-Adds a feature "Native OS Firmware Update Service" in F10 setup interface to enable/disable firmware update via Window Update service.
-Updates SuperIO firmware  to v4.13.29 for stability enhancement.
-Enhancement to address security vulnerabilities  CVE-2019-0124.
-Enhancement to address security vulnerabilities CVE-2019-0123, CVE-2019-0117, CVE-2019-11135, CVE-2019-11139.
-Enhancement to address security vulnerabilities CVE-2019-0185, CVE-2019-0154.

              PCR0(TPM1.2)  	      = 58CB355EC040A17D7AB06F1C964B59EFE46185E4  
              PCR0(TPM2.0 SHA1)	      =	0F6F182DE34DE5903A72C5BF1812A1E359398B52	
              PCR0(TPM2.0 SHA256)     = 6F4EC202A077191595412B4FCE7283CE4C97F8FC13245067B9EA6D0A5C57810B

Version 2.43
-Fixes issue where specific SanDisk USB drive is not listed in F9 Boot Menu.
-Adds a feature "Native OS Firmware Update Service" in F10 setup interface to enable/disable firmware update via Window Update service.
-Updates SuperIO firmware  to v4.13.29 for stability enhancement.
-Enhancement to address security vulnerabilities  CVE-2019-0124.
-Enhancement to address security vulnerabilities CVE-2019-0123, CVE-2019-0117, CVE-2019-11135, CVE-2019-11139.
-Enhancement to address security vulnerabilities CVE-2019-0185, CVE-2019-0154.

              PCR0(TPM1.2)  	      = 73F3E40C32620797E39D21DF7BBFE6182819E684  
              PCR0(TPM2.0 SHA1)	      =	EBCB1A4E38A8F13B02AC77579BEDBA9501C62A14	
              PCR0(TPM2.0 SHA256)     = 949DE7EAACAB46A51DA3B6196DEFC4131942A705D1328B62CA549C348F2DB3D8

Version 2.42
- Enhancement to address security vulnerabilities PSR-2019-0138

              PCR0(TPM1.2)  	      = 9EECED9A28D2D4872F3D662BA5A77DFCD9B8A8B0  
              PCR0(TPM2.0 SHA1)	      =	6934831A76FAA508828A1A4DCD10943D1926F1FA	
              PCR0(TPM2.0 SHA256)     = A258382E0874F716337E118DC557CC3F5F07C239AAA79FA0C30F02774653750B
Version 2.39
-Fixed issue where Automatic DriveLock password is not following with BIOS Administrator password when HDD is moved to another unit.
-Fixed issue where "legacy bootable option" is not listed in F9 when powering on unit with "USB to RJ45 dongle" and "USB flash disk" attached
-Locks power button function during TPM firmware update process to avoid firmware corruption.
-Enhancement to address security vulnerabilities CVE-2018-12126, CVE-2018-12127, CVE-2018-12130.
-Enhancement to address security vulnerabilities CVE-2018-6622.

              PCR0(TPM1.2)  	      = 6377B9064337357B8555E9E7091395BFA281F587  
              PCR0(TPM2.0 SHA1)	      =	047DA8E0D78C7886270EC01C5CBD243007F0C02E	
              PCR0(TPM2.0 SHA256)     = 801B6C91621CDBBF67DBEC110469E09AA3DDFE90D9CF16CC692F777BB4DDD056

Version 2.37
-Fixed issue where Win7 OS cannot be installed successful after executing "Secure Erase" on Toshiba SSD KBG30ZMV256G.
-Fixed issue where system cannot enter the Startup menu when choosing restart Windows to the firmware UI.
-Fixed issue where no bootable device found (3F0) on the first boot after swapping the bootable drives.
-Fixed issue where changes made in BIOS Setup (F10) after a failed PXE boot does not be saved.
-Fixed issue where BIOS update triggered by Windows Update does not occur after input the incorrect Admin password then input correct password.
-Fixed issue where function keys in POST stop working after deploy system via SCC.
-Fixed issue where system BSOD when resume from hibernation with Win7 UEFI OS.
-Fixed issue where system event log reports warning ID 17 message about "WHEA-Logger".
-Increase PXE IP time-to-live (TTL) value to improved compatibility with diverse end-user network environments.
-Enhancement to address security vulnerabilities.

              PCR0(TPM1.2)  	      = 42B0B64B8D1FD781913E4F833C3D573F333270E5  
              PCR0(TPM2.0 SHA1)	      =	5A954E4861931549714A28A24F3A7A5CE6E4427F	
              PCR0(TPM2.0 SHA256)     = 8BE624E829DA4A5FDB412BC0A4163D4A7A9DFDC576A5453832BBF4F6D5782742


Version 2.36
-Fixes issue where Device Guard test tool reports HSTI warning message.
-Fixes issue where the option ¡§Prompt for Admin password on Capsule Update¡¨ cannot be set to "Enable" in F10 setup interface.
-Fixes issue where system cannot power on after abnormal shutdown or power loss when S5 Maximum Power Savings is enabled.
-Fixes issue where Physical Presense Interface is disabled in BIOS, but system still request PPI when "Drivelock Password on restart" setting changes.
-Fixes issue where BIOS cannot rollback back to previous version with security vulnerability issue in non-delay mode. 
-Fixes issue where system still requests DriveLock password during restart when "DriveLock password on Restart" is disabled in BIOS.

              PCR0(TPM1.2)  	      = D075727A1BA283434C4C6B016E315F154088A099  
              PCR0(TPM2.0 SHA1)	      =	9665166F41F41CCC4523B7D75884B255F3266698	
              PCR0(TPM2.0 SHA256)     = 47F386E9187FCA72C9FA3C8A93D40C0D0EB85D2CCAB29129D96B63ECD56E39BE


Version 2.35
-Security update with new MCU version
NOTE: Due to the security changes in this release, attempts to install older BIOS versions will require the user to be physically present to accept the older version.

              PCR0(TPM1.2)  	      = 3CED572762833699A26BDD09D4F8DA508ABDD93C  
              PCR0(TPM2.0 SHA1)	      =	ABDE1BA558F5F49850A53BD60B3C9875F8498A06	
              PCR0(TPM2.0 SHA256)     = AC458CE0FD60E30A29DCBB84CC8D4CC8AA288F9F9F14A1FD45A89051132181EF
HP Recommended

Strange indeed.

Probably an error but who knows.  It would have been nice if the Business Center support was able to answer what/why they are missing when you have some documentation showing there used to be updates.

I suspect the files are still on the FTP server, I just do not know how to find them or even where the index files are located.


I'm not an HP employee.
Did this message answer your question? Please indicate below as an Accepted Solution!
Did you find this message useful? Click on the "Was this reply helpful" Yes button.
HP Recommended

I noticed the same thing indeed. About a month and a half ago the web site did have the BIOS version 02.52, but as mentioned above it disappeared and I am only seeing 02.35.

If you install the HP assistant on the HP computer, it should still be showing the latest 02.52 BIOS update as being available (at least it is in my case), with the file name sp111858.

I did download the file sp111858.exe at the time it was available on the web site, but given that it is not shown on the web site anymore, I am unsure if I will apply this update in case it got pulled for a valid reason (even though it does look like a site issue given that the HP assistant software still shows it).

Side note: I did report this issue via the feedback form on the HP support web site about three weeks ago.

HP Recommended

Hi Tifosi 👍.

 

Thanks for posting the SP number of the latest version, and also the information that it is still available via HP assistant. So it should be possible to download the SP via HP FTP-Server.

 

I opened a HP support case via telephone, and they have now escalated it to 2nd level. Registering an HP business support account failed due to bugs on their website. I remember the days where HP support was much more superior.

 

HP Recommended

Today I received the information from second level support, that the product is no longer being supported.

 

Come on HP this is so embarrassing.

What has happened to your company which was a paragon in computer industry long time ago?

† The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the <a href="https://www8.hp.com/us/en/terms-of-use.html" class="udrlinesmall">Terms of Use</a> and <a href="/t5/custom/page/page-id/hp.rulespage" class="udrlinesmall"> Rules of Participation</a>.