On May 26, a user on HP’s support forums reported that a forced, automatic BIOS update had bricked their HP ProBook 455 G7 into an unusable state. Subsequently, other users have joined the thread to sound off about experiencing the same issue.

This common knowledge regarding BIOS software would, then, seem to make automatic, forced BIOS updates a real issue, even if it weren’t breaking anything. Allowing the user to manually install and prepare their systems for a BIOS update is key to preventing issues like this.

At the time of writing, HP has made no official comment on the matter — and since this battery update was forced on laptops originally released in 2020, this issue has also bricked hardware outside of the warranty window, when previously users could simply send in the laptop for a free repair.

Overall, this isn’t a very good look for HP, particularly its BIOS update practices. The fragility of BIOS software should have tipped off the powers at be at HP about the lack of foresight in this release model, and now we’re seeing it in full force with forced, bugged BIOS updates that kill laptops.

    • tibi@lemmy.world
      link
      fedilink
      English
      arrow-up
      30
      ·
      6 months ago

      Microsoft should also be to blame here. Sending BIOS updates via automatic windows updates should not be a thing.

        • Voyajer@lemmy.world
          link
          fedilink
          English
          arrow-up
          18
          ·
          6 months ago

          Not sure when the sentiment changed, but it used to be heavily recommended against updating the bios on any computer unless there was a specific feature or fix your computer needed.

          • jj4211@lemmy.world
            link
            fedilink
            English
            arrow-up
            4
            ·
            6 months ago

            Sentiment changed when the “BIOS” became a component for enforcing security architecture via “SecureBoot” and also Bitlocker sealed to PCRs only does so much if the BIOS code is vulnerable. Now they really badly want a “trusted” chain from some root of trust until the OS bootloader takes over. Problem is that the developers have historically enjoyed being in a trusted, single user context for decades and so the firmware has been full of holes when actually pushed.