We move this version to stable.
You can check your current BIOS version following the steps here to determine if you are on the latest release.
NOTE:
-
If you have lost your Secure Boot keys and cannot enable Secure Boot, the screen will still appear as shown in the picture below, even after setting the ‘Restore Secure Boot to Factory Settings’ option to ‘Enabled’ and then selecting ‘Save and Exit’.
Failure Status:
Secure Boot Database = Unlocked
Secure Boot State = Disabled
User Customized Security = YESPlease use either Framework_Laptop_13_11th_Gen_Intel_Core_BIOS_3.22_ClearVar.exe (in Windows) or Framework_Laptop_13_11th_Gen_Intel_Core_BIOS_3.22_ClearVar.zip (for EFI Shell) to perform the update.
After the BIOS update is complete:
- Restart your laptop and press F2 to enter the BIOS setup menu.
- Navigate to Security > Secure Boot.
- Set “Restore Secure Boot to Factory Settings” to Enabled.
- Save your changes and exit the BIOS. The system will then restore the secure boot key and enable secure boot automatically upon rebooting."
Subscribing to release notifications
If you want to subscribe to new release notifications you can now opt in through this link to receive an email when we release a new BIOS or driver update for your Framework Laptop.
Battery Extender functionality
With the high energy density on the 61Wh battery, leaving it at 100% state of charge for an extended period of time can shorten the lifetime of the battery. To prevent this, we have added a new feature that automatically limits the maximum state of charge if the system is left plugged into power for more than 5 days. The timer is reset after the system is disconnected from a power adapter for more than 30 minutes.
Battery Extender Duration | Battery State of Charge |
---|---|
0-5< Days | 99% → 100% |
5-7 Days | 90% → 95% |
>7+ Days | 85% → 87% |
This functionality also reduces cycling of the battery by allowing the battery to discharge by several percent before charging again. Note that in addition to this automatic setting, you can also manually set a lower charge limit on your battery in BIOS to further preserve battery longevity.
This feature can be disabled or enabled in the BIOS Advanced menu.
Battery Extender: This option is enabled by default. If disabled, the system will always keep the battery fully charged.
Battery Extender Trigger: This option sets the number of days that must pass before the battery state of charge is reduced automatically to extend the battery life.
Battery Extender Reset: This option sets the number of minutes that the system is running on battery before the extender is reset, causing the system to charge to 100% when attached to power again.
Battery Charge Limit Functionality
This release modifies the battery charge limit functionality to add a 5% float range. This allows us to reduce the number of microcycles on the battery when the CPU turbos.
Previously to the change in 3.07, the battery would be held at the target state of charge, so if a large power draw happened for a short time, such as when the CPU turbos, the battery would drain slightly and then charge again.
Introduced in this version, the battery will not start to charge until the battery has dropped 5% below the charge limit.
As an example, if the user sets the battery charge limit to 80%, the battery will maintain a state of charge between 80% and 75%. And will not charge up to 80% until it has discharged to 75% while the system is on.
If this is activated while the battery state of charge is above the limit, the battery will discharge without drawing power from the adapter until the upper limit is reached.
Downloads
Windows
Download Link | SHA256 |
---|---|
Framework_Laptop_13_11th_Gen_Intel_Core_BIOS_3.22.exe | 615BB57BDC664817DFA34E53D5D2D2E561AA3B6D8AD53BE8CB535A0FDF2BD0BE |
Framework_Laptop_13_11th_Gen_Intel_Core_BIOS_3.22_ClearVar.exe | 918D7CFF2564FA83B7BC406A7D6D89D8618C82819D0495401E718F52511770A4 |
Instructions for Windows Installer:
- Run the .exe.
- Click yes to reboot.
- Wait for the firmware progress bar to complete, and then the system will reboot.
- If you are updating a system in standalone mode, please pay careful attention to the standalone update process below.
Please note that you must update with a charger attached.
Linux/LVFS
There will not be an LVFS update for this specific release because it has an Intel CSME update, which can’t be delivered through LVFS. Use the UEFI Shell update method instead for this release.
Linux/Other/UEFI Shell update
Please note, you need to update to 3.17 or later to update using EFI, as this is needed to support capsule on disk.
You can download the release below, please follow the update instructions below.
Download Link | SHA256 |
---|---|
Framework_Laptop_13_11th_Gen_Intel_Core_BIOS_3.22.zip | 6A37E0EF49066448D903BFF8502ADB3B53D576C9234C38195B930371EB7C8E74 |
Framework_Laptop_13_11th_Gen_Intel_Core_BIOS_3.22_ClearVar.zip | 7B3BCCC8831DDFC76185B3761396C4221EEA032BD17609FFAD44E1124BE3AC3A |
We have rewritten the update process for EFI. This new version will stage the bios onto your internal SSD and run them all together in sequence. This is to avoid issues with usb devices disconnecting and disappearing during subsequent updates during the update process, which would cause partial updates to be applied.
Troubleshooting:
If you experience ports not working after your update. Please shutdown, unplug all power sources, wait 90 seconds, and then power on again.
Note that if you use the EFI shell update with Windows, you should suspend Bitlocker if enabled before updating using the EFI updater.
Instructions for EFI shell update:
- Extract contents of zip folder to a FAT32 formatted USB drive. Cleanly unmount the drive before physically removing it, otherwise the BIOS update may not function correctly.
- Boot your system while pressing F12 and boot from the thumb drive.
- Let startup.nsh run automatically.
- Follow the instructions to install the update.
Updating a Mainboard outside of a laptop
This release supports standalone updates without a battery attached only when updating using the EFI shell method only. After rebooting, please follow the onscreen instructions to update your BIOS when in standalone mode, which will require moving the power source between both sides of the Mainboard to allow PD firmware to update correctly.
Please note that the power and display output must be connected to the same side during standalone updates. Failure to do this may result in no display output during the update process.
We recommend the following update flow for standalone updates:
Part 1
Ensure that standalone operation is enabled in the bios advanced setup menu.
Display connected to upper left port.
Power connected to the lower left port.
Run the updater from EFI shell. Please follow the “Instructions for EFI shell update” to run the updater.
Select the EFI USB Boot Device.
The Updater will update the PD controller from right side. Press any key to continue updating.
Part 2
Plug the AC to the left side, then boot to EFI updater. The Updater will update the PD controller from left side. Press any key to continue updating.
After PD updates, it will reboot automatically, then start the BIOS capsule update.
Then, the EC will update after BIOS section finishes.
Security Fixes
CVE | Note | Score (CVSS Version 3.x) |
---|---|---|
CVE-2023-38655 | Improper buffer restrictions in firmware | 6.8 |
CVE-2022-35897 | An stack buffer overflow vulnerability leads to arbitrary code execution issue | 6.8 |
CVE-2024-49200 | AcpiS3SaveDxe and ChipsetSvcDxe | 6.4 |
CVE-2024-30211 | Improper access control in some Intel(R) ME driver pack installer | 6.0 |
CVE-2023-40067 | Unchecked return value in firmware | 5.7 |
CVE-2024-28956 | Enhancement to address security vulnerability | 5.6 |
CVE-2023-34424 | Improper input validation in firmware | 4.4 |
CVE-2024-21844 | Integer overflow in firmware | 4.3 |
CVE-2023-35061 | Improper initialization | 4.3 |
CVE-2024-26021 | Improper initialization in the firmware | 2.3 |
CVE-2023-48361 | Improper initialization in firmware | 2.3 |
Enhancements
- Updated Intel CSME to 15.0.50.2633_Consumer.
- Updated Microcode to 0xBA.
- Added automatic battery lifetime extender if the system is attached to AC for several days.
- Added BIOS option to prevent TPM PCRs changing when TBT eGPU is attached.
- Dual Display (Panel + External Monitor) support for pre-boot (BIOS/POST)
Fixes
- Fixed issue where the system cannot power on automatically when “power on AC attach” was enabled.
- Fixed missing secure boot key that prevented secure boot from being enabled.
- Fixed CVE-2023-38655, CVE-2023-40067, CVE-2023-34424, CVE-2023-35061, CVE-2024-21844, CVE-2023-48361, CVE-2024-26021, CVE-2024-30211, CVE-2024-28956, CVE-2024-49200, and CVE-2022-35897.
Component Versions
This BIOS update is a bundle of updates to multiple embedded components in the system.
Not all of them use the same version number.
BIOS | 3.22 | Updated |
---|---|---|
EC | hx20_v0.0.1-a7cf293 | Updated |
PD | 3.4.0.2576 | Same as previous version |
Intel CSME | 15.0.50.2633 | Updated |
Known Issues
- The EFI update will not work with filesystems that are formatted using MBR.
- If you get a security violation as part of the EFI update. Please disable secure boot.
- This update requires a battery present to complete the update.
- Linux users have reported that S3 sleep no longer works.