Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

Discord to introduce age verification for full access to platform next month

Turning lignocellulosic biomass into sustainable fuel for transportation

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route
Identity

Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route

userBy userSeptember 23, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 23, 2025Ravi LakshmananFirmware security/vulnerabilities

Cybersecurity researchers have revealed details of two security vulnerabilities affecting Super Micro Baseboard Management Controller (BMC) firmware that could allow attackers to bypass critical verification steps and update the system with specially created images.

Both list the moderate vulnerabilities that arise from inappropriate verification of cryptographic signatures below –

CVE-2025-7937 (CVSS Score: 6.6) – A crafted firmware image can update the system firmware by bypassing the Root of Trust (ROT) 1.0 logic of Super Micro BMC Firmware Verification Logic and redirecting the program to the “FWMAP” table in the unsigned region. The logic in the SuperMicro BMC firmware verification signature table is for updating the system firmware by redirecting the program to a false signature table (“SIG_TABLE”) in the region that is not signed

DFIR Retainer Service

The image verification process that is performed during a firmware update takes place in three steps. Get the public key from the BMCSPI flash chip, process the “FWMAP” or “SIG_TABLE” table decorated with the uploaded image, calculate the cryptographic hash digestion for all “signed ‘firmware’ areas, and check the signature value for the rounded hash dim.

CVE-2025-7937 said it was a bypass of CVE-2024-10237, which was disclosed by Supermicro in January 2025.

CVE-2024-10237 “is a logical flaw in the process of verifying uploaded firmware, and ultimately the BMC SPI chip could recur with a malicious image,” Binarly researcher Anton Ivanov said in a report shared with Hacker News. “This security issue will allow potential attackers to gain full and sustained control over both the BMC system and the main server OS.”

“The vulnerability demonstrated that the verification process can be manipulated by adding a custom entry to the ‘FWMAP’ table and relocating the original signed content of the image into an unreserved firmware space.

Meanwhile, CVE-2024-10238 and CVE-2024-10239 are two stack overflow flaws in the image validation function in the firmware, allowing an attacker to execute arbitrary code in the BMC context.

Binarly’s analysis reveals that the CVE-2024-10237 fix is ​​insufficient, identifying potential attack routes that a custom “FWMAP” table can insert before the original table. This allows threat actors to run custom code in the context of a BMC system.

CIS Build Kit

Further investigation into the implementation of firmware verification logic for X13SEM-F motherboards has determined a flaw in the “auth_bmc_sig” function that allows attackers to load malicious images without changing the hash digest value.

“Again, all the area used for the digest calculation is defined in the uploaded image itself (“sig_table”), so you can modify it along with the rest of the image (for example the kernel) and move the original data into unused space in the firmware,” Ivanov said. “This means that the signed data digest matches the original value.”

The successful exploitation of CVE-2025-6198 not only updates the BMC system with specially created images, but also allows you to bypass the BMC ROT security feature.

“Previously, we reported the discovery of test keys on supermicro devices, and its PSIRT doubled that hardware corruption (Trust’s Root) authenticated the key and did not affect this discovery,” Alex Matrosov, CEO and Head of Research at Binarly, told Hacker News.

“However, new research shows that previous statements from Supermicro are not accurate and that CVE-2025-6198 bypass BMC corruption. In this case, all signing key leaks affect the entire ecosystem. Reusing signing keys is not the best approach. In the case of encrypted signing keys, it can cause industry-wide impact.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleEurojust arrested 100 million euro cryptocurrency investment fraud that spans 23 countries
Next Article Disney is increasing prices for next month’s Hulu subscription, Disney+
user
  • Website

Related Posts

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

February 9, 2026

SolarWinds Web Help Desk exploited by RCE in multi-stage attack against public servers

February 9, 2026

AI Skill Malware, 31Tbps DDoS, Notepad++ Hack, LLM Backdoors and More

February 9, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

China-linked UNC3886 targets Singapore’s telecom sector with cyber espionage

Discord to introduce age verification for full access to platform next month

Turning lignocellulosic biomass into sustainable fuel for transportation

TechCrunch Founders Summit 2026 | TechCrunch

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.