Security researchers have identified a series of critical vulnerabilities in the Intelligent Platform Management Interface (IPMI) firmware used in Supermicro baseboard management controllers (BMCs). These vulnerabilities, ranging from High to Critical severity, expose systems to the risk of privilege escalation and execution of malicious code.
Futhermore, Supermicro has responded by releasing a firmware update to patch these vulnerabilities, aiming to secure affected systems from potential exploitation. BMCs are specialized processors on server motherboards that facilitate remote server management, allowing administrators to monitor hardware parameters and make adjustments even when the host operating system is offline.
Additionally, the most severe vulnerability, CVE-2023-40289, has been classified as “critical” as it enables authenticated attackers to gain root access to the BMC system, potentially leading to a complete compromise and the deployment of persistent malware.
The other six vulnerabilities, including cross-site scripting (XSS) flaws, can be used in combination to create an admin account for the BMC IPMI software’s web server component, providing attackers with the opportunity to perform command injection and execute malicious code.
At the same time, despite no reported instances of malicious exploitation, the significant exposure of Supermicro IPMI web interfaces raises concerns about potential threats targeting these vulnerabilities, especially given the large number of internet-exposed Supermicro IPMI interfaces.
These vulnerabilities underscore the importance of promptly applying security updates and patches to address potential security risks in critical systems like BMCs. The capability for attackers to gain remote access to servers and deploy malware poses a significant threat, making it crucial for organizations to prioritize cybersecurity measures to protect their infrastructure from potential exploitation.