This firmware update (3.0.2) provided by IBM updates QRadar® M5 appliances with microcode security fixes and includes updates for UEFI, IMM2, RAID controllers, and HDD sotware. This firmware can be used on all QRadar M5s for both 1U or 2U form factor appliances, but requires that the administrator has configured IMM.
Part 1: About the M5 Firmware 3.0.2 ISO Update
The M5 firmware update 3.0.2 is intended to remotely update firmware on appliances. This firmware includes multiple security vulnerabilities and updates. Administrators must extract the EXE file and apply the IMM2 update, then the ISO can be mounted to apply the firmware update. Administrators must update their IMM using the included .UXZ file before they can mount and reboot with the ISO is required to install the firmware. Updating the IMM2 firmware first prevents installation issues when the core firmware update is applied. The installation instructions are located on tab named 'Part 2. Installing Firmware Updates'. These instructions have been updated to guide customers through a remote upgrade of their firmware. For more information about QRadar firmware, see our FAQ page at http://ibm.biz/qradarfirmware.
Important: If your appliance is in a HA pair, there are configuration steps required to set the status properly for your primary and secondary high-availability appliances. For more information, see: http://www.ibm.com/support/docview.wss?uid=swg27047121#HA.
Supported appliances, types, and model information
This firmware update applies to the following IBM Security QRadar M5 appliances, server type, or Machine type models:
|Appliance Name||Server Type||Lenovo Server Machine Type||IBM Machine Type-Model|
|IBM Security QRadar xx05 G3||x3550 M5||MT 8869||4412-Q1E|
|IBM Security QRadar Event Collector 1501 G3||x3550 M5||MT 8869||4412-Q4D|
|IBM Security QRadar Network Insights 1901||x3550 M5||MT 8869||4412-F4Y|
|IBM Security QRadar xx29||x3650 M5||MT 8871||4412-Q2A|
|IBM Security QRadar xx48||x3650 M5||MT 8871||4412-Q3B|
|IBM Security QRadar Incident Forensics||x3650 M5||MT 8871||4412-F1A|
|IBM Security QRadar Network Insights 1920||x3650 M5||MT 8871||4412-F3F|
|IBM Security QRadar Network Packet Capture||x3650 M5||MT 8871||4412-F2C|
Important file changes and prerequisites in this firmware update
The table below lists the software versions contained within the firmware package. The core change in this release (3.0.2) is to provide new UEFI microcode security updates and IMM2 updates for administrators. Administrators must ensure that their M5 appliance includes the minimum version outlined in the Prerequisite version column, if any pre-requisites are defined.
IMPORTANT: Administrators might see a warning message about a required firmware update of uEFI to version 1.20(TCE108i) during installation. This is a benign error message and the administrator can click OK and ignore the message. See the installation tab of this release note for more information.
|Component||Prerequisite version||Firmware version in this update||File name|
|UEFI/BIOS (1U 8869)||uEFI v1.20 (TCE108i)||tbe132l-2.52||oem_fw_uefi_tbe132l-2.52_anyos_32-64|
|UEFI/BIOS (2U 8871)||uEFI v1.20 (TCE108i)||tce132n-2.53||oem_fw_uefi_tce132n-2.53_anyos_32-64|
|RAID Controller M1215||None||1200-24.21.0-0016-02||lnvgy_fw_sraidmr_1200-24.21.0-0016-02_linux_x86-64|
|RAID Controller M5210||None||5200-24.16.0-0108||lnvgy_fw_sraidmr_5200-24.16.0-0108_linux_x86-64|
|Component||File name||CVEs resolved in this package|
|IMM2||oem_fw_imm2_tcoe36c-4.40_anyos_noarch||CVE-2017-11176, CVE-2013-4345, CVE-2016-6515, CVE-2017-7526, CVE-2011-2699, CVE-2015-5366, CVE-2015-5177, CVE-2016-7567, CVE-2017-14106, CVE-2016-4912, CVE-2012-4428|
|UEFI/BIOS (1U 8869)||oem_fw_uefi_tbe132l-2.52_anyos_32-64||CVE-2017-5715|
|UEFI/BIOS (2U 8871)||oem_fw_uefi_tce132n-2.53_anyos_32-64||CVE-2017-5715|
|RAID Controller M1215||lnvgy_fw_sraidmr_1200-24.21.0-0016-02_linux_x86-64||None|
|RAID Controller M5210||lnvgy_fw_sraidmr_5200-24.16.0-0108_linux_x86-64||None|
|Other Security Fixes||None||Security vulnerabilities resolved in open source packages where there is no IMM exposure:|
CVE-2016-9131, CVE-2016-9147, CVE-2016-9444, CVE-2017-0663, CVE-2017-5969, CVE-2017-7375, CVE-2017-7376, CVE-2017-7526, CVE-2017-3142, CVE-2017-3143, CVE-2017-1000366, CVE-2016-9318, CVE-2017-9047, CVE-2017-9048, CVE-2017-9049, CVE-2017-9050, CVE-2017-9022, CVE-2017-9023, CVE-2013-4520, CVE-2015-7995, CVE-2015-9019, CVE-2016-4738, CVE-2017-5029, CVE-2016-2775, CVE-2016-6170, CVE-2017-3136, CVE-2017-3137, CVE-2017-3138, CVE-2016-9586, CVE-2017-7407, CVE-2016-9042, CVE-2017-6451, CVE-2017-6458, CVE-2017-6460, CVE-2017-6462, CVE-2017-6463, CVE-2017-6464, CVE-2015-8540, CVE-2016-10087
Where do you find more information?
Before you begin
- This installation method uses the hardware's integrated management module (IMM) to remotely update files.
- Administrators MUST enable IMM.Over.LAN on the xSeries appliance BEFORE the firmware update is applied. For information on how to enable this setting, see: http://www.ibm.com/support/docview.wss?uid=swg21982944.
- If your appliances are in a HA pair, you must prepare your high-availability appliances using the instructions found here: http://www.ibm.com/support/docview.wss?uid=swg27047121#HA.
- A number of hard disk drive updates can be installed by this firmware. The HDD update tool examines the hard disk drive types that are present and selects the most current firmware level that is available based on the drive type automatically.
- The base system pack contains other firmware packages that are not in QRadar appliances. Therefore, these packages are displayed during the update with a status of "undetected" and not selected to be updated. The administrator can disregard any packages labeled as undetected
- If the Emulex card firmware does not install as intended or you experience an issue, you can continue the firmware installation and any Emulex issues will be addressed in the next firmware update. If you do not have an Emulex card with your appliance, the installation instructions include a screen capture of the error message that is generated during the firmware install.
Downloading and extracting the firmware update
- Download the QRadar M5 appliance firmware update from IBM Fix Central: https://www-945.ibm.com/support/fixcentral/swg/selectFixes?product=ibm%2FOther+software%2FIBM+Security+QRadar+Vulnerability+Manager&fixids=7.3.1-QRADAR-FIRMWARE-M5-QRadar-QNI-PCAP-QIF-3.0.2&source=SAR&function=fixId&parent=IBM%20Security
- Copy the M5 appliance firmware EXE to a directory on the Windows host.
- Double-click on the file:Qradar_All_M5_ISO_MT8869_x3550_MT8871_x3650_3_0_2.exe.
- Select or type a directory path for the M5 firmware update and click Extract.
- The following files are extracted to the Windows host.
Updating the IMM firmware
- Log in to the IMM interface on your QRadar M5 appliance.
- Select Server Management > Server Firmware from the menu.
- Click Update Firmware
- Click Select File and browser to the IMM2 firmware update: oem_fw_imm2_tcoe36c-4.40_anyos_noarch.uxz.
- Click Next to upload and verify the IMM2 firmware file.
- In the Additional Options, select to update the primary and secondary firmware banks.
- Wait for the update the primary and secondary firmware banks to complete.
- Click Restart IMM and clear your browser cache.
After the IMM interface reboots, log in to the IMM and continue to the next section to mount the firmware ISO and configure the boot options.
Mounting the M5 Firmware ISO
- Click on Remote Control.
- To start the Remote Control session click on use Active X for Internet Explorer or Java for all other Browsers.
- Click on Start Remote Control in Single User Mode.
NOTE: Administrators should always use single user mode for remote connections for updates.
- Administrators should leave the Allow others to request my remote session disconnect check box clear. It is not recommended for administrators to allow other users to request the active session for firmware updates.
- From the menu, select Virtual Media > Activate.
- From the menu, select Virtual Media > Select Devices to Mount.
- From the Devices window click on Add Image.
- Locate the ISO image you wish to use. Click Open.
- Select the CD/DVD QRadar_All_M5 is highlighted and verify that the Mapped check box is selected.
- Click Mount Selected.
- Power Up or Reboot the system to start the software installation process.
- As the appliance is rebooting, press the F12 key to select a boot device.
- At the Boot Devices Manager window use the arrow keys to navigate.
- Administrators must cleart the Legacy Mode check box, then select the CD/DVDM option and press ENTER.
- The boot screen for the appliance is displayed. The IBM ToolsCenter Welcome page is displayed.
- When prompted, select the Updates option.
- Verify that the Updates list shows the correct machine type for the appliance.
Hardware Details Server Type x3550 M5
Server Machine Type MT 8869
NOTE: For example, System x3650 M5 -- machine type 8871.
- To start the update link, select Click here to start update.
- Select your language and click I accept the terms in the license agreement to continue.
- The IBM UpdateXpress System Pack Installer compares the current package with the installed firmware.
- From the list of selected firmware items, verify that the selected items match the firmware items to update.
- If your appliance has a secondary firmware bank, select the Target the secondary firmware bank check box and Click Next. If you do not have an alternate firmware bank, this option is ignored.
- To start applying the updates, click Next on the Update Options page.
The bootable media creator starts to install firmware on the M5 appliance.
- IMPORTANT: Some administrators are experiencing an issue where the UEFI firmware generates an error message stating that uEFI version 1.20(TCE108i) is required. The QRadar firmware ships with UEFI v2.x by default. Administrators who experience this message can click OK to ignore this message and continue the firmware update.
- Verify that all the firmware updates are applied, and click Next to complete the update.
- After the update is complete, click Save Log to save the installation log to the USB flash drive. This file can be provided to support in case any issues occurred during the update.
- Select the USB flash drive and click OK.
- When all updates are complete, click Finish to reboot the appliance.
- The appliance reboots and starts up normally.
Emulex Update Error Messages
This update might issue an Emulex installation warning to administrators that can be ignored. Not all QRadar M5 pr M4 appliances ship with an Emulex card. The firmware update contains software to attempt to update the Emulex drivers; however, if the appliance does not include an Emulex, an installation error will be displayed, "Install did not succeed" as shown below.
Where do you find more information?
Original Publication Date
29 March 2017
23 June 2018