Article Details
Scrape Timestamp (UTC): 2023-10-06 06:05:40.216
Source: https://thehackernews.com/2023/10/supermicros-bmc-firmware-found.html
Original Article Text
Click to Toggle View
Supermicro's BMC Firmware Found Vulnerable to Multiple Critical Vulnerabilities. Multiple security vulnerabilities have been disclosed in the Intelligent Platform Management Interface (IPMI) firmware for Supermicro baseboard management controllers (BMCs) that could result in privilege escalation and execution of malicious code on affected systems. The seven flaws, tracked from CVE-2023-40284 through CVE-2023-40290, vary in severity from High to Critical, according to Binarly, enabling unauthenticated actors to gain root access to the BMC system. Supermicro has shipped a BMC firmware update to patch the bugs. BMCs are special processors on server motherboards that support remote management, enabling administrators to monitor hardware indicators such as temperature, set fan speed, and update the UEFI system firmware. What's more, BMC chips remain operational even if the host operating system is offline, making them lucrative attack vectors to deploy persistent malware. A brief explainer of each of the vulnerabilities is below - CVE-2023-40289 is "critical because it allows authenticated attackers to gain root access and completely compromise the BMC system," Binarly said in a technical analysis published this week. "This privilege allows to make the attack persistent even while the BMC component is rebooted and to move laterally within the compromised infrastructure, infecting other endpoints." The other six vulnerabilities – CVE-2023-40284, CVE-2023-40287, and CVE-2023-40288 in particular – could be used to create an account with admin privileges for the web server component of the BMC IPMI software. As a result, a remote attacker looking to take control of the servers could combine them with CVE-2023-40289 to perform command injection and achieve code execution. In a hypothetical scenario, this could play in the form of sending a phishing email bearing a booby-trapped link to the administrator's email address that, when clicked, triggers the execution of the XSS payload. There is presently no evidence of any malicious exploitation of the vulnerabilities in the wild, although Binarly said it observed more than 70,000 instances of internet-exposed Supermicro IPMI web interfaces at the start of October 2023. "First, it is possible to remotely compromise the BMC system by exploiting vulnerabilities in the Web Server component exposed to the internet," the firmware security company explained. "An attacker can then gain access to the Server's operating system via legitimate iKVM remote control BMC functionality or by flashing the UEFI of the target system with malicious firmware that allows persistent control of the host OS. From there, nothing prevents an attacker from lateral movement within the internal network, compromising other hosts." Earlier this year, two security flaws were revealed in AMI MegaRAC BMCs that, if successfully exploited, could allow threat actors to remotely commandeer vulnerable servers and deploy malware.
Daily Brief Summary
Multiple security vulnerabilities have been uncovered in Supermicro's baseboard management controllers (BMCs) firmware that could permit privilege escalation and execution of harmful code on impacted systems.
The seven flaws have been tracked and their severity varies from high to critical, allowing unauthorized individuals to gain root access to the BMC system.
Supermicro has released a BMC firmware update to rectify these vulnerabilities.
BMC chips, used for remote server management, are potential attack vectors for the deployment of persistent malware as they remain operational even if the host is offline.
One of the identified vulnerabilities is particularly critical, allowing authenticated attackers to gain root access and thoroughly compromise the BMC system.
By exploiting some of the other vulnerabilities, an attacker could potentially create an admin account for the web server component of the BMC IPMI software, paving the way for remote control and compromise of servers.
Currently, there's no evidence of any malicious exploitation of these vulnerabilities, though over 70,000 instances of internet-exposed Supermicro IPMI web interfaces were identified in early October.