InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route
Technology

Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route

September 23, 2025 4 Min Read
Share
Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route
SHARE

Cybersecurity researchers have revealed details of two security vulnerabilities affecting Super Micro Baseboard Management Controller (BMC) firmware that could allow attackers to bypass critical verification steps and update the system with specially created images.

Both list the moderate vulnerabilities that arise from inappropriate verification of cryptographic signatures below –

  • CVE-2025-7937 (CVSS Score: 6.6) – A crafted firmware image can update the system firmware by bypassing the logic of Rot (ROT) 1.0 of the Supermicro BMC firmware verification logic and redirecting it to a fake “FWMAP” table in the unsigned area.
  • CVE-2025-6198 (CVSS Score: 6.4) – A crafted firmware image can update the system firmware by bypassing the super micro BMC firmware verification logic in the signature table and redirecting the program to the fake signature table (“sig_table”) in the non-signature area.

The image verification process that is performed during a firmware update takes place in three steps. Get the public key from the BMCSPI flash chip, process the “FWMAP” or “SIG_TABLE” table decorated with the uploaded image, calculate the cryptographic hash digestion for all “signed ‘firmware’ areas, and check the signature value for the rounded hash dim.

CVE-2025-7937 said it was a bypass of CVE-2024-10237, which was disclosed by Supermicro in January 2025.

CVE-2024-10237 “is a logical flaw in the process of verifying uploaded firmware, and ultimately the BMC SPI chip could recur with a malicious image,” Binarly researcher Anton Ivanov said in a report shared with Hacker News. “This security issue will allow potential attackers to gain full and sustained control over both the BMC system and the main server OS.”

See also  Sneaky 2FA phishing kit adds BitB pop-up designed to mimic browser address bar

https://www.youtube.com/watch?v=26kctsgjoxs

“The vulnerability demonstrated that the verification process can be manipulated by adding a custom entry to the ‘FWMAP’ table and relocating the original signed content of the image into an unreserved firmware space.

Meanwhile, CVE-2024-10238 and CVE-2024-10239 are two stack overflow flaws in the image validation function in the firmware, allowing an attacker to execute arbitrary code in the BMC context.

Binarly’s analysis reveals that the CVE-2024-10237 fix is ​​insufficient, identifying potential attack routes that a custom “FWMAP” table can insert before the original table. This allows threat actors to run custom code in the context of a BMC system.

Further investigation into the implementation of firmware verification logic for X13SEM-F motherboards has determined a flaw in the “auth_bmc_sig” function that allows attackers to load malicious images without changing the hash digest value.

“Again, all the area used for the digest calculation is defined in the uploaded image itself (“sig_table”), so you can modify it along with the rest of the image (for example the kernel) and move the original data into unused space in the firmware,” Ivanov said. “This means that the signed data digest matches the original value.”

The successful exploitation of CVE-2025-6198 not only updates the BMC system with specially created images, but also allows you to bypass the BMC ROT security feature.

“Previously, we reported the discovery of test keys on supermicro devices, and its PSIRT doubled that hardware corruption (Trust’s Root) authenticated the key and did not affect this discovery,” Alex Matrosov, CEO and Head of Research at Binarly, told Hacker News.

See also  X warns users with security keys to re-register by November 10 to avoid lockout

“However, new research shows that previous statements from Supermicro are not accurate and that CVE-2025-6198 bypass BMC corruption. In this case, all signing key leaks affect the entire ecosystem. Reusing signing keys is not the best approach. In the case of encrypted signing keys, it can cause industry-wide impact.”

Share This Article
Twitter Copy Link
Previous Article The CEO says there is still a possibility, but recovery is "Very difficult" The CEO says there is still a possibility, but recovery is "Very difficult"
Next Article LA will not fire city workers this year, the mayor says LA will not fire city workers this year, the mayor says

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

WhatsApp Worm, Critical CVE, Oracle 0-Day, Ransomware Cartel, and More
Technology

WhatsApp Worm, Critical CVE, Oracle 0-Day, Ransomware Cartel, and More

25 Min Read
Cisco Asa Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive
Technology

Cisco Asa Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive

3 Min Read
ASD warns of ongoing BADCANDY attack exploiting Cisco IOS XE vulnerability
Technology

ASD warns of ongoing BADCANDY attack exploiting Cisco IOS XE vulnerability

3 Min Read
New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT
Technology

New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?