InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route
Technology

Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route

September 23, 2025 4 Min Read
Share

Cybersecurity researchers have revealed details of two security vulnerabilities affecting Super Micro Baseboard Management Controller (BMC) firmware that could allow attackers to bypass critical verification steps and update the system with specially created images.

Both list the moderate vulnerabilities that arise from inappropriate verification of cryptographic signatures below –

  • CVE-2025-7937 (CVSS Score: 6.6) – A crafted firmware image can update the system firmware by bypassing the logic of Rot (ROT) 1.0 of the Supermicro BMC firmware verification logic and redirecting it to a fake “FWMAP” table in the unsigned area.
  • CVE-2025-6198 (CVSS Score: 6.4) – A crafted firmware image can update the system firmware by bypassing the super micro BMC firmware verification logic in the signature table and redirecting the program to the fake signature table (“sig_table”) in the non-signature area.

The image verification process that is performed during a firmware update takes place in three steps. Get the public key from the BMCSPI flash chip, process the “FWMAP” or “SIG_TABLE” table decorated with the uploaded image, calculate the cryptographic hash digestion for all “signed ‘firmware’ areas, and check the signature value for the rounded hash dim.

CVE-2025-7937 said it was a bypass of CVE-2024-10237, which was disclosed by Supermicro in January 2025.

CVE-2024-10237 “is a logical flaw in the process of verifying uploaded firmware, and ultimately the BMC SPI chip could recur with a malicious image,” Binarly researcher Anton Ivanov said in a report shared with Hacker News. “This security issue will allow potential attackers to gain full and sustained control over both the BMC system and the main server OS.”

See also  US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

https://www.youtube.com/watch?v=26kctsgjoxs

“The vulnerability demonstrated that the verification process can be manipulated by adding a custom entry to the ‘FWMAP’ table and relocating the original signed content of the image into an unreserved firmware space.

Meanwhile, CVE-2024-10238 and CVE-2024-10239 are two stack overflow flaws in the image validation function in the firmware, allowing an attacker to execute arbitrary code in the BMC context.

Binarly’s analysis reveals that the CVE-2024-10237 fix is ​​insufficient, identifying potential attack routes that a custom “FWMAP” table can insert before the original table. This allows threat actors to run custom code in the context of a BMC system.

Further investigation into the implementation of firmware verification logic for X13SEM-F motherboards has determined a flaw in the “auth_bmc_sig” function that allows attackers to load malicious images without changing the hash digest value.

“Again, all the area used for the digest calculation is defined in the uploaded image itself (“sig_table”), so you can modify it along with the rest of the image (for example the kernel) and move the original data into unused space in the firmware,” Ivanov said. “This means that the signed data digest matches the original value.”

The successful exploitation of CVE-2025-6198 not only updates the BMC system with specially created images, but also allows you to bypass the BMC ROT security feature.

“Previously, we reported the discovery of test keys on supermicro devices, and its PSIRT doubled that hardware corruption (Trust’s Root) authenticated the key and did not affect this discovery,” Alex Matrosov, CEO and Head of Research at Binarly, told Hacker News.

See also  Experts confirm that JS#SMUGGLER uses compromised sites to deploy NetSupport RAT

“However, new research shows that previous statements from Supermicro are not accurate and that CVE-2025-6198 bypass BMC corruption. In this case, all signing key leaks affect the entire ecosystem. Reusing signing keys is not the best approach. In the case of encrypted signing keys, it can cause industry-wide impact.”

Share This Article
Twitter Copy Link
Previous Article The CEO says there is still a possibility, but recovery is "Very difficult" The CEO says there is still a possibility, but recovery is "Very difficult"
Next Article LA will not fire city workers this year, the mayor says LA will not fire city workers this year, the mayor says

You Might Also Like

North Korean Hackers
Technology

North Korean hackers use EtherHiding to hide malware inside blockchain smart contracts

4 Min Read
Legacy Python bootstrap script creates domain takeover risk for multiple PyPI packages
Technology

Legacy Python bootstrap script creates domain takeover risk for multiple PyPI packages

5 Min Read
Samsung fixes critical zero-day CVE-2025-21043 utilized in Android attacks
Technology

Samsung fixes critical zero-day CVE-2025-21043 utilized in Android attacks

1 Min Read
New eavesdropping attack extracts Intel SGX ECDSA key via DDR4 memory bus interposer
Technology

New eavesdropping attack extracts Intel SGX ECDSA key via DDR4 memory bus interposer

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?