Supermicro BMC Firmware Vulnerabilities Allow Firmware Tampering
Summary
Hide ▲
Show ▼
Two medium-severity vulnerabilities in Supermicro Baseboard Management Controller (BMC) firmware allow attackers to bypass firmware verification and update the system with malicious firmware. These vulnerabilities, CVE-2025-7937 and CVE-2025-6198, exploit flaws in the cryptographic signature verification process. The vulnerabilities affect the Root of Trust (RoT) security feature, potentially allowing attackers to gain persistent control over the BMC system and the main server OS. The issues were discovered by Binarly, a firmware security company. Supermicro has released firmware fixes for impacted models, and Binarly has released proof-of-concept exploits for both vulnerabilities. CVE-2025-7937 is a bypass for a previously disclosed vulnerability, CVE-2024-10237, which was reported by NVIDIA. CVE-2025-6198 bypasses the BMC RoT security feature, raising concerns about the reuse of cryptographic signing keys.
Timeline
-
24.09.2025 23:13 1 articles · 7d ago
Supermicro releases firmware fixes for impacted models
Supermicro has released firmware fixes for impacted models. Binarly has released proof-of-concept exploits for both vulnerabilities, highlighting the need for prompt action to protect potentially impacted systems.
Show sources
- New Supermicro BMC flaws can create persistent backdoors — www.bleepingcomputer.com — 24.09.2025 23:13
-
23.09.2025 21:00 2 articles · 9d ago
Two Supermicro BMC Firmware Vulnerabilities Disclosed
Two medium-severity vulnerabilities in Supermicro BMC firmware, CVE-2025-7937 and CVE-2025-6198, were disclosed. These vulnerabilities allow attackers to bypass the firmware verification process and update the system with malicious firmware. CVE-2025-7937 is a bypass for a previously disclosed vulnerability, CVE-2024-10237, which was reported by NVIDIA. The fix for CVE-2024-10237 was found to be insufficient, allowing attackers to inject a malicious fwmap before the vendor’s original is loaded, bypassing signature verification. CVE-2025-6198 bypasses the BMC RoT security feature, raising concerns about the reuse of cryptographic signing keys. The vulnerability arises from a flawed validation logic within the auth_bmc_sig function, allowing attackers to modify the kernel or other regions while keeping the digest valid. Supermicro has released firmware fixes for impacted models. Binarly has released proof-of-concept exploits for both vulnerabilities.
Show sources
- Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security — thehackernews.com — 23.09.2025 21:00
- New Supermicro BMC flaws can create persistent backdoors — www.bleepingcomputer.com — 24.09.2025 23:13
Information Snippets
-
CVE-2025-7937 (CVSS 6.6) allows a crafted firmware image to bypass the Supermicro BMC firmware verification logic of Root of Trust (RoT) 1.0.
First reported: 23.09.2025 21:002 sources, 2 articlesShow sources
- Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security — thehackernews.com — 23.09.2025 21:00
- New Supermicro BMC flaws can create persistent backdoors — www.bleepingcomputer.com — 24.09.2025 23:13
-
CVE-2025-6198 (CVSS 6.4) allows a crafted firmware image to bypass the Supermicro BMC firmware verification logic of the Signing Table.
First reported: 23.09.2025 21:002 sources, 2 articlesShow sources
- Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security — thehackernews.com — 23.09.2025 21:00
- New Supermicro BMC flaws can create persistent backdoors — www.bleepingcomputer.com — 24.09.2025 23:13
-
CVE-2025-7937 is a bypass for CVE-2024-10237, which was disclosed by Supermicro in January 2025.
First reported: 23.09.2025 21:002 sources, 2 articlesShow sources
- Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security — thehackernews.com — 23.09.2025 21:00
- New Supermicro BMC flaws can create persistent backdoors — www.bleepingcomputer.com — 24.09.2025 23:13
-
CVE-2024-10237 is a logical flaw in the validation process of the uploaded firmware.
First reported: 23.09.2025 21:002 sources, 2 articlesShow sources
- Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security — thehackernews.com — 23.09.2025 21:00
- New Supermicro BMC flaws can create persistent backdoors — www.bleepingcomputer.com — 24.09.2025 23:13
-
CVE-2024-10238 and CVE-2024-10239 are stack overflow flaws in the firmware's image verification function.
First reported: 23.09.2025 21:001 source, 1 articleShow sources
- Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security — thehackernews.com — 23.09.2025 21:00
-
CVE-2025-6198 bypasses the BMC RoT security feature, allowing attackers to load a malicious image without modifying the hash digest value.
First reported: 23.09.2025 21:002 sources, 2 articlesShow sources
- Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security — thehackernews.com — 23.09.2025 21:00
- New Supermicro BMC flaws can create persistent backdoors — www.bleepingcomputer.com — 24.09.2025 23:13
-
The vulnerabilities affect the firmware validation process, which involves retrieving the public key, processing the 'fwmap' or 'sig_table', and verifying the signature value.
First reported: 23.09.2025 21:002 sources, 2 articlesShow sources
- Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security — thehackernews.com — 23.09.2025 21:00
- New Supermicro BMC flaws can create persistent backdoors — www.bleepingcomputer.com — 24.09.2025 23:13
-
CVE-2025-7937 allows attackers to inject a malicious fwmap before the vendor’s original is loaded, bypassing signature verification.
First reported: 24.09.2025 23:131 source, 1 articleShow sources
- New Supermicro BMC flaws can create persistent backdoors — www.bleepingcomputer.com — 24.09.2025 23:13
-
CVE-2025-6198 exploits a flaw in the auth_bmc_sig function, allowing attackers to modify the kernel or other regions while keeping the digest valid.
First reported: 24.09.2025 23:131 source, 1 articleShow sources
- New Supermicro BMC flaws can create persistent backdoors — www.bleepingcomputer.com — 24.09.2025 23:13
-
Supermicro has released firmware fixes for impacted models, and Binarly has released proof-of-concept exploits for both vulnerabilities.
First reported: 24.09.2025 23:131 source, 1 articleShow sources
- New Supermicro BMC flaws can create persistent backdoors — www.bleepingcomputer.com — 24.09.2025 23:13
Similar Happenings
UNC5174 Exploits VMware Zero-Day Privilege Escalation Since October 2024
A China-linked threat actor, UNC5174, has been exploiting a zero-day privilege escalation vulnerability in VMware products since mid-October 2024. The flaw, CVE-2025-41244, affects multiple VMware products and allows local attackers to escalate privileges to root on affected virtual machines. The vulnerability was discovered in May 2025 and patched in VMware Tools 12.4.9 and later versions. The flaw is rooted in the get_version() function, which can be exploited by placing a malicious binary in a writable directory. UNC5174 has been observed using this method to gain elevated access and execute code on compromised systems. The exact payload and nature of the attacks remain unclear. Broadcom has confirmed the patch for the vulnerability in VMware Aria Operations and VMware Tools. NVISO released a proof-of-concept exploit demonstrating privilege escalation on vulnerable VMware software. UNC5174 has been linked to previous attacks on U.S. defense contractors, UK government entities, Asian institutions, and the cybersecurity firm SentinelOne, exploiting vulnerabilities such as F5 BIG-IP CVE-2023-46747 and ConnectWise ScreenConnect flaw. The exploitation of CVE-2025-41244 is considered trivial, potentially benefiting multiple malware strains. NVISO identified the vulnerability in mid-May 2025 during an incident response engagement with UNC5174. Broadcom disclosed three vulnerabilities on September 29, 2025, including CVE-2025-41244. The CVSS severity rating for CVE-2025-41244 is 7.8, classified as high.
CISA Emergency Directive 25-03: Mitigation of Cisco ASA Zero-Day Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive 25-03, mandating federal agencies to identify and mitigate zero-day vulnerabilities in Cisco Adaptive Security Appliances (ASA) exploited by an advanced threat actor. The directive requires agencies to account for all affected devices, collect forensic data, and upgrade or disconnect end-of-support devices by September 26, 2025. The vulnerabilities allow threat actors to maintain persistence and gain network access. Cisco identified multiple zero-day vulnerabilities (CVE-2025-20333, CVE-2025-20362, CVE-2025-20363, and CVE-2025-20352) in Cisco ASA, Firewall Threat Defense (FTD) software, and Cisco IOS software. These vulnerabilities enable unauthenticated remote code execution, unauthorized access, and denial of service (DoS) attacks. GreyNoise detected large-scale campaigns targeting ASA login portals and Cisco IOS Telnet/SSH services, indicating potential exploitation of these vulnerabilities. The campaign is widespread and involves exploiting zero-day vulnerabilities to gain unauthenticated remote code execution on ASAs, as well as manipulating read-only memory (ROM) to persist through reboot and system upgrade. CISA and Cisco linked these ongoing attacks to the ArcaneDoor campaign, which exploited two other ASA and FTD zero-days (CVE-2024-20353 and CVE-2024-20359) to breach government networks worldwide since November 2023. CISA ordered agencies to identify all Cisco ASA and Firepower appliances on their networks, disconnect all compromised devices from the network, and patch those that show no signs of malicious activity by 12 PM EDT on September 26. CISA also ordered that agencies must permanently disconnect ASA devices that are reaching the end of support by September 30 from their networks. The U.K. National Cyber Security Centre (NCSC) confirmed that threat actors exploited the recently disclosed security flaws in Cisco firewalls to deliver previously undocumented malware families like RayInitiator and LINE VIPER. Cisco began investigating attacks on multiple government agencies in May 2025, linked to the state-sponsored ArcaneDoor campaign. The attacks targeted Cisco ASA 5500-X Series devices to implant malware, execute commands, and potentially exfiltrate data. The threat actor modified ROMMON to facilitate persistence across reboots and software upgrades. The compromised devices include ASA 5500-X Series models running specific software releases with VPN web services enabled. The Canadian Centre for Cyber Security urged organizations to update to a fixed version of Cisco ASA and FTD products to counter the threat. Nearly 50,000 Cisco ASA and FTD appliances are vulnerable to actively exploited flaws. The vulnerabilities CVE-2025-20333 and CVE-2025-20362 enable arbitrary code execution and access to restricted URL endpoints. The Shadowserver Foundation discovered over 48,800 internet-exposed ASA and FTD instances still vulnerable to the flaws. The majority of vulnerable devices are located in the United States, followed by the United Kingdom, Japan, Germany, Russia, Canada, and Denmark. The Shadowserver Foundation's data is as of September 29, indicating a lack of response to the ongoing exploitation activity. Greynoise had warned on September 4 about suspicious scans targeting Cisco ASA devices, indicating upcoming undocumented flaws. CISA's emergency directive gave 24 hours to FCEB agencies to identify and upgrade vulnerable Cisco ASA and FTD instances. CISA advised that ASA devices reaching their end of support should be disconnected from federal networks by the end of September. The U.K. NCSC reported that the hackers deployed Line Viper shellcode loader malware and RayInitiator GRUB bootkit.
Cisco IOS and IOS XE SNMP Zero-Day Exploited in Attacks
Cisco has released security updates to address a high-severity zero-day vulnerability (CVE-2025-20352) in Cisco IOS and IOS XE Software. The flaw is a stack-based buffer overflow in the Simple Network Management Protocol (SNMP) subsystem, actively exploited in attacks. This vulnerability allows authenticated, remote attackers to cause denial-of-service (DoS) conditions or gain root control of affected systems. The vulnerability impacts all devices with SNMP enabled, including specific Cisco devices running Meraki CS 17 and earlier. Cisco advises customers to upgrade to a fixed software release, specifically Cisco IOS XE Software Release 17.15.4a, to remediate the vulnerability. Temporary mitigation involves limiting SNMP access to trusted users and disabling the affected Object Identifiers (OIDs) on devices. Additionally, Cisco patched 13 other security vulnerabilities, including two with available proof-of-concept exploit code. Cisco also released patches for 14 vulnerabilities in IOS and IOS XE, including eight high-severity vulnerabilities. Proof-of-concept exploit code exists for two of the vulnerabilities, but exploitation is not confirmed. Three additional medium-severity bugs affect Cisco’s SD-WAN vEdge, Access Point, and Wireless Access Point (AP) software.
Authentication Bypass Vulnerabilities in Wondershare RepairIt
Two critical authentication bypass vulnerabilities in Wondershare RepairIt expose user data and AI models. The flaws, identified as CVE-2025-10643 and CVE-2025-10644, allow attackers to bypass authentication and execute arbitrary code on customer endpoints. The vulnerabilities stem from insecure handling of cloud access tokens and lack of encryption, potentially leading to supply chain attacks and data breaches. The issues were disclosed by Trend Micro researchers in September 2025. Wondershare has not yet responded to the disclosure, and users are advised to restrict interaction with the product until a fix is available.
Critical Deserialization RCE Vulnerability in SolarWinds Web Help Desk
SolarWinds has released a third patch to address a critical deserialization vulnerability (CVE-2025-26399) in Web Help Desk 12.8.7 and earlier versions. This flaw allows unauthenticated remote code execution (RCE) on affected systems. The vulnerability was discovered by an anonymous researcher and reported through Trend Micro's Zero Day Initiative (ZDI). The flaw is a patch bypass for CVE-2024-28988, which itself was a bypass for CVE-2024-28986. The original vulnerability was exploited in the wild and added to the Known Exploited Vulnerabilities (KEV) catalog by CISA. SolarWinds advises users to update to version 12.8.7 HF1 to mitigate the risk. SolarWinds Web Help Desk is a help desk and ticketing suite used by medium-to-large organizations for IT support request tracking, workflow automation, asset management, and compliance assurance. The vulnerability affects the AjaxProxy component, and the hotfix requires replacing specific JAR files.