Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

Patch Bypassed for Supermicro Vulnerability Allowing BMC Hack

Binarly researchers have found a way to bypass a patch for a previously disclosed vulnerability. 

Motherboard vulnerability

Supermicro has patched two BMC vulnerabilities that can be exploited to perform malicious firmware updates on impacted devices.

According to firmware security company Binarly, one of these security holes is the result of a previously issued patch being bypassed. 

The BMC (Baseboard Management Controller), a specialized chip typically present on the motherboard of servers and high-end computers, provides out-of-band management capabilities that allow administrators to remotely monitor and manage the device, even if the operating system is down or the power is off.

Supermicro informed customers in January that a researcher from Nvidia had discovered several BMC firmware vulnerabilities, including CVE-2024-10237, an image authentication issue that could allow an attacker to conduct malicious firmware updates.

“An attacker can modify the firmware to bypass BMC inspection and bypass the signature verification process,” Supermicro explained.

A malicious firmware update would enable the attacker to gain complete and persistent control of the BMC and the operating system. 

Advertisement. Scroll to continue reading.

Binarly analyzed CVE-2024-10237 and discovered that the patch released by Supermicro could be bypassed. As a result, the vendor assigned a new CVE identifier, CVE-2025-7937, and this month made another attempt to patch it

During its investigation, Binarly also found another similar vulnerability, which has been assigned the CVE identifier CVE-2025-6198.

The cybersecurity firm warned that CVE-2025-6198 can be exploited not only to deploy a malicious firmware image, but also to bypass the Root of Trust (RoT) security feature, which ensures the integrity and authenticity of the BMC firmware. 

Supermicro has patched this vulnerability as well with its latest updates, and noted that there is no evidence of in-the-wild exploitation for either of the flaws.

“These findings matter because they show how fragile firmware validation can be, even with supposed hardware-backed security,” Alex Matrosov, CEO and head of research at Binarly, told SecurityWeek

“Keep in mind, successful exploits for these vulnerabilities give attackers persistent code execution at the BMC level and control of both the Base Management Controller and the main OS. This presents significant risk to enterprise organizations,” Matrosov added.

Binarly has published a video showing the exploit in action:

BMC vulnerabilities being exploited in malicious attacks is not unheard of. CISA warned recently that an AMI BMC flaw allowing attackers to take control of the target machine has been exploited in attacks. 

Related: Critical AMI BMC Vulnerability Exposes Servers to Disruption, Takeover

Related: Flaw in Industrial Computer Maker’s UEFI Apps Enables Secure Boot Bypass on Many Devices

Related: Palo Alto Networks Addresses Impact of BIOS, Bootloader Vulnerabilities on Its Firewalls

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Sumo Logic has named Jeremy Powell as CISO and Ben Cody as SVP of Product Management.

Bitdefender has appointed Frank Koelmel as Chief Revenue Officer of Business Solutions Group.

John Hernandez has joined BlueVoyant as Chief Executive Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.