This firmware update (v3.3.0) provided by IBM updates QRadar® M5 appliances with microcode security fixes and includes updates for UEFI, IMM2, Dynamic System Analysis, RAID controllers and a HDD software update. This firmware can be used on all QRadar M5s for both 1U or 2U form factor appliances.
Part 1: About the M5 Firmware 3.3.0 ISO Update
The M5 firmware update 3.3.0 is intended to remotely update firmware on QRadar appliances. This update adds new firmware versions and resolves a sizing issue reported in Samsung solid state drives (SSDs): FRU 01GR787, Model number MZILS3T8HMLHV3. See: http://ibm.biz/qradarm5ssd for more info.
Administrators must update their IMM using the included .UXZ file before they can mount and reboot with the ISO is required to install the firmware update. Updating the IMM2 firmware as the first step prevents installation issues when the core firmware update is applied. The installation instructions are located on tab named 'Part 2. Installing Firmware Updates'. These instructions have been updated to guide customers through a remote upgrade of their firmware. For more information about QRadar firmware or to find our on-premise USB instructions, see our FAQ page at http://ibm.biz/qradarfirmware.
Important: If your appliance is in a HA pair, there are configuration steps required to set the status properly for your primary and secondary high-availability appliances. For more information, see: http://www.ibm.com/support/docview.wss?uid=swg27047121#HA.
Supported appliances, types, and model information
This firmware update applies to the following IBM Security QRadar M5 appliances, server type, or Machine type models:
|Appliance Name||Server Type||Lenovo Server Machine Type||IBM Machine Type-Model|
|IBM Security QRadar xx05 G3||x3550 M5||MT 8869||4412-Q1E|
|IBM Security QRadar Event Collector 1501 G3||x3550 M5||MT 8869||4412-Q4D|
|IBM Security QRadar Network Insights 1901||x3550 M5||MT 8869||4412-F4Y|
|IBM Security QRadar xx29||x3650 M5||MT 8871||4412-Q2A|
|IBM Security QRadar xx48||x3650 M5||MT 8871||4412-Q3B|
|IBM Security QRadar Incident Forensics||x3650 M5||MT 8871||4412-F1A|
|IBM Security QRadar Network Insights 1920||x3650 M5||MT 8871||4412-F3F|
|IBM Security QRadar Network Packet Capture||x3650 M5||MT 8871||4412-F2C|
Important file changes and prerequisites in this firmware update
The table below lists the software versions contained within the firmware package. The core change in this release (3.3.0) is to provide new UEFI microcode security updates and IMM2 updates for administrators. Administrators must ensure that their M5 appliance includes the minimum version outlined in the Prerequisite version column, if any prerequisites are defined.
|Component||Prerequisite version||Firmware version in this update||File name|
|UEFI/BIOS (1U 8869)||uEFI v1.20 (TCE108i)||tceg38g-2.81||oem_fw_uefi_tceg38g-2.81_anyos_32-64|
|UEFI/BIOS (2U 8871)||uEFI v1.20 (TCE108i)||tceg38g-2.81||oem_fw_uefi_tceg38g-2.81_anyos_32-64|
|IMM2||tcoe26o (version 3.75)||tcoe46f-5.11||oem_fw_imm2_tcoe46f-5.11_anyos_noarch|
Note: No version change from the M5 v3.2.1 firmware release.
|RAID Controller M1215||None||24.21.0-0067-2||lnvgy_fw_sraidmr_1200-24.21.0-0067-2_linux_x86-64|
|RAID Controller M5210||None||24.21.0-0067-2||lnvgy_fw_sraidmr_5200-24.21.0-0067-2_linux_x86-64|
Security issues resolved in this firmware update
The table below lists the software versions contained within the firmware package and the applicable CVEs addressed in this firmware release.
|Component||File name||CVEs resolved in this package|
|UEFI/BIOS (1U 8869)||oem_fw_uefi_tceg38g-2.81_anyos_32-64||None|
|UEFI/BIOS (2U 8871)||oem_fw_uefi_tceg38g-2.81_anyos_32-64||None|
|IMM2||oem_fw_imm2_tcoe46f-5.11_anyos_noarch||CVE-2018-0737, CVE-2018-1000120, CVE-2018-1000121, CVE-2018-1000122, CVE-2018-1000301, CVE-2018-14404, CVE-2018-15473|
|RAID Controller M1215||lnvgy_fw_sraidmr_1200-24.21.0-0052-1_linux_x86-64||None|
|RAID Controller M5210||lnvgy_fw_sraidmr_5200-24.21.0-0052-1_linux_x86-64||None|
|Other Security Fixes||None||Security vulnerabilities resolved in open source packages where there is no IMM exposure:
CVE-2017-17833, CVE-2018-0732, CVE-2008-1483, CVE-2016-10012, CVE-2016-10708, CVE-2017-15906
NOTE: Administrators can use any text editor to review a detailed change list for firmware update v3.3.0. Click the .txt file and open the document in any text editor program.
A. Before you begin
This installation method uses the hardware's integrated management module (IMM) to remotely update files.
- Administrators MUST enable IMM.Over.LAN on the xSeries appliance BEFORE the firmware update is applied. For information on how to enable this setting, see: http://www.ibm.com/support/docview.wss?uid=swg21982944.
- If your appliances are in a HA pair, you must prepare your high-availability appliances using the instructions found here: http://www.ibm.com/support/docview.wss?uid=swg27047121#HA.
- A number of hard disk drive updates can be installed by this firmware. The HDD update tool examines the hard disk drive types that are present and selects the most current firmware level that is available based on the drive type automatically.
- The base system pack contains other firmware packages that are not in QRadar appliances. Therefore, these packages are displayed during the update with a status of "undetected" and not selected to be updated. The administrator can disregard any packages labeled as undetected
- If the Emulex card firmware does not install as intended or you experience an issue, you can continue the firmware installation and any Emulex issues will be addressed in the next firmware update. If you do not have an Emulex card with your appliance, the installation instructions include a screen capture of the error message that is generated during the firmware install.
B. Downloading and extracting the firmware update
- Download the QRadar M5 appliance firmware update from IBM Fix Central: http://www.ibm.com/support/fixcentral/swg/quickorder?parent=IBM%20Security&product=ibm/Other+software/IBM+Security+QRadar+SIEM&release=7.3.0&platform=All&function=fixId&fixids=7.3.1-QRADAR-FIRMWARE-M5-QRadar-QNI-PCAP-QIF-3.3.0&includeSupersedes=0&source=fc
- Copy the M5 appliance firmware EXE to a directory on the Windows host.
- Double-click on the file: Qradar_All_ISO_M5_1U_MT8869_x3550_2U_MT8871_x3650_3_3_0.exe.
- Select or type a directory path for the M5 firmware update and click Extract.
- The following files are extracted to the Windows host.
C. Updating the IMM firmware
- Log in to the IMM interface on your QRadar M5 appliance.
- Select Server Management > Server Firmware from the menu.
- Click Update Firmware
- Click Select File and browser to the IMM2 firmware update: oem_fw_imm2_tcoe46f-5.11_anyos_noarch.uxz.
- Click Next to upload and verify the IMM2 firmware file.
- Wait for the update the primary and secondary firmware banks to complete.
- Click Restart IMM and clear your browser cache.
After the IMM interface reboots, log in to the IMM and continue to the next section to mount the firmware ISO and configure the boot options.
D. Mounting the M5 Firmware ISO & Reboot Procedure
- Click on Remote Control.
- To start the Remote Control session click on use Active X for Internet Explorer or Java for all other Browsers.
- Click on Start Remote Control in Single User Mode.
NOTE: Administrators should always use single user mode for remote connections for updates.
- Administrators should leave the Allow others to request my remote session disconnect check box clear. It is not recommended for administrators to allow other users to request the active session for firmware updates.
- From the menu, select Virtual Media > Activate.
- From the menu, select Virtual Media > Select Devices to Mount.
- From the Devices window click on Add Image.
- Locate the ISO image you wish to use. Click Open.
- Select the CD/DVD QRadar_All_M5 is highlighted and verify that the Mapped check box is selected.
- Click Mount Selected.
- Power Up or Reboot the system to start the software installation process.
- As the appliance is rebooting, press the F12 key to select a boot device.
- At the Boot Devices Manager window use the arrow keys to navigate.
- Administrators must clear the Legacy Mode check box, then select the CD/DVDM option and press ENTER.
- The boot screen for the appliance is displayed. The IBM ToolsCenter Welcome page is displayed.
- When prompted, select the Updates option.
- Verify that the Updates list shows the correct machine type for the appliance.
Hardware Details Server Type x3550 M5
Server Machine Type MT 8869
NOTE: For example, System x3650 M5 -- machine type 8871.
- To start the update link, select Click here to start update.
- Select your language and click I accept the terms in the license agreement to continue.
- The IBM UpdateXpress System Pack Installer compares the current package with the installed firmware.
- Verify that all check Suggested boxes are selected. Some end users have reported issues where uEFI updates were not selected by default. In this example image, we are reinstalling over an existing firmware update, so your versions and suggested updates will differ.
- If your M5 appliance has a secondary firmware bank it will be updated automatically.
Important: Administrators should be aware that if you are prompted with a Target the secondary firmware bank check box, you should click Next without selecting this option. If you target the secondary firmware back the installer will IGNORE the firmware update to the primary bank and the installation will need to be reapplied to update the primary firmware bank for the appliance.
- To start applying the updates, click Next on the Update Options page.
The bootable media creator starts to install firmware on the M5 appliance.
- Verify that all the firmware updates are applied, and click Next to complete the update.
- After the update is complete, click Save Log to save the installation log to the USB flash drive. This file can be provided to support in case any issues occurred during the update.
- Select the USB flash drive and click OK.
- When all updates are complete, click Finish to reboot the appliance.
Wait for the appliance to reboot. After any UEFI update, administrators should allow the appliance to boot past the F1 prompt to ensures that all updates are installed.
If you have any issues with the appliance booting or with firmware update problems, you can open a case with QRadar Support. If you have issues with the appliance booting after you update firmware, attach your update collect preboot DSA logs from the QRadar appliance.
The firmware installer might issue an Emulex error to administrators that can be ignored. Not all QRadar M5 appliances ship with an Emulex card. The firmware update contains software to attempt to update the Emulex drivers; however, if the appliance does not include an Emulex, an installation error will be displayed, "Install did not succeed".
Emulex Update Error Messages
07 January 2021