Supermicro BMC security updates 2024-04

From Thomas-Krenn-Wiki
Jump to navigation Jump to search

In April 2024, Supermicro published several BMC firmware updates for X11, X12, X13, H11, H12, H13, M11, M12, B11 and B12 mainboards for the elimination of safety vulnerabilities in the BMC firmware. Thomas-Krenn generally recommends that remote maintenance access such as IPMI or Redfish or SSH should only be operated behind protected firewalls/VPNs and not made openly available on the Internet—see also IPMI Best Practices.

Here is an extract from the tabular overview of Supermicro´s security vulnerabilities:[1]

issue ID severity issue type description
SMCI ID: SMC-2024010010

CVE ID: CVE-2024-36430

Binarly ID: BRLY-2023-022

high Command Injection Attack Backend command used by the BMC for SMTP notification will accept un-sanitized credentials that allow for BMC OS command injection.

A BMC account with administrator privilege is required to be logged in.

Supermicro CVSSv3 score: 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) 

SMCI ID: SMC-2024010011

CVE ID: CVE-2024-36431

Binarly ID: BRLY-2023-023

high XSS attack Poisoned lang local storage item is evaluated without sanitation that allow the unauthorized creation of user accounts

on behalf of the logged in user accounts on behalf of the logged in account with administrator privileges. Supermicro CVSSv3 score: 8.3 (AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)

SMCI ID: SMC-2024010012

CVE ID: CVE-2023-33413

Binarly ID: BRLY-2023-030

high Command Injection attack Supermicro’s BMC allows an SNMP configuration file to be uploaded and applied.

The configuration file could be used to load additional modules from unauthorized dynamic libraries. The malicious configuration is persistent across BMC reboots. A BMC account with administrator privilege is required. Supermicro CVSSv3 score: 8.3 (AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)

Updates for products of Thomas-Krenn

Updates for the corresponding system can be found in the download area of Thomas-Krenn. The updates in the download area have been tested by us to guarantee the stability and compatibility of our systems.

If you require the latest version for your system and it is not yet available in our download area, you can get it at Supermicro.

References


Translator: Alina Ranzinger

Alina has been working at Thomas-Krenn.AG since 2024. After her training as multilingual business assistant, she got her job as assistant of the Product Management and is responsible for the translation of texts and for the organisation of the department.


Related articles

Redfish Host Interface
Safety instructions for IPv6 PixieFail
Supermicro BMC safety updates "terrapin attack", October 2024