Vulnerabilites related to SMCI - MBD-X12DPG-OA6
cve-2024-10238
Vulnerability from cvelistv5
Published
2025-02-04 08:00
Modified
2025-02-04 14:33
Severity ?
EPSS score ?
Summary
A security issue in the firmware image verification implementation
at Supermicro MBD-X12DPG-OA6. An attacker can upload a specially crafted image that will cause a stack overflow is caused by not checking fld->used_bytes.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SMCI | MBD-X12DPG-OA6 |
Version: 1.04.16 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-10238", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T14:33:06.944209Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-04T14:33:16.387Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "BMC" ], "product": "MBD-X12DPG-OA6", "vendor": "SMCI", "versions": [ { "status": "affected", "version": "1.04.16", "versionType": "BMC" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA security issue in the firmware image verification implementation \n\n at Supermicro MBD-X12DPG-OA6. An attacker can upload a specially crafted image that will cause a stack overflow is caused by not checking fld-\u0026gt;used_bytes.\u003c/span\u003e" } ], "value": "A security issue in the firmware image verification implementation \n\n at Supermicro MBD-X12DPG-OA6. An attacker can upload a specially crafted image that will cause a stack overflow is caused by not checking fld-\u003eused_bytes." } ], "impacts": [ { "capecId": "CAPEC-112", "descriptions": [ { "lang": "en", "value": "CAPEC-112: Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121: Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T08:00:51.373Z", "orgId": "def9a96e-e099-41a9-bfac-30fd4f82c411", "shortName": "Supermicro" }, "references": [ { "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Jan_2025" } ], "source": { "discovery": "UNKNOWN" }, "title": "fld-\u003eused_bytes without sanity check causes stack overflow", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "def9a96e-e099-41a9-bfac-30fd4f82c411", "assignerShortName": "Supermicro", "cveId": "CVE-2024-10238", "datePublished": "2025-02-04T08:00:51.373Z", "dateReserved": "2024-10-22T03:14:23.997Z", "dateUpdated": "2025-02-04T14:33:16.387Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-10239
Vulnerability from cvelistv5
Published
2025-02-04 08:02
Modified
2025-02-04 14:25
Severity ?
EPSS score ?
Summary
A security issue in the firmware image verification implementation at Supermicro MBD-X12DPG-OA6 . An attacker with administrator privileges can upload a specially crafted image, which can cause a stack overflow due to the unchecked fat->fsd.max_fld.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SMCI | MBD-X12DPG-OA6 |
Version: 1.04.16 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-10239", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T14:25:08.579433Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-04T14:25:28.872Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "BMC" ], "product": "MBD-X12DPG-OA6", "vendor": "SMCI", "versions": [ { "status": "affected", "version": "1.04.16", "versionType": "BMC" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA security issue in the firmware image verification implementation at Supermicro\u0026nbsp;MBD-X12DPG-OA6\u0026nbsp;. An attacker with administrator privileges can upload a specially crafted image, which can cause a stack overflow due to the unchecked fat-\u0026gt;fsd.max_fld.\u003c/span\u003e" } ], "value": "A security issue in the firmware image verification implementation at Supermicro\u00a0MBD-X12DPG-OA6\u00a0. An attacker with administrator privileges can upload a specially crafted image, which can cause a stack overflow due to the unchecked fat-\u003efsd.max_fld." } ], "impacts": [ { "capecId": "CAPEC-112", "descriptions": [ { "lang": "en", "value": "CAPEC-112: Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121: Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T08:02:02.414Z", "orgId": "def9a96e-e099-41a9-bfac-30fd4f82c411", "shortName": "Supermicro" }, "references": [ { "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Jan_2025" } ], "source": { "discovery": "EXTERNAL" }, "title": "fld-\u003eused_bytes without sanity check causes stack overflow", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "def9a96e-e099-41a9-bfac-30fd4f82c411", "assignerShortName": "Supermicro", "cveId": "CVE-2024-10239", "datePublished": "2025-02-04T08:02:02.414Z", "dateReserved": "2024-10-22T03:14:25.875Z", "dateUpdated": "2025-02-04T14:25:28.872Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-10237
Vulnerability from cvelistv5
Published
2025-02-04 07:59
Modified
2025-02-04 14:38
Severity ?
EPSS score ?
Summary
There is a vulnerability in the BMC firmware image authentication design
at Supermicro MBD-X12DPG-OA6
. An attacker can modify the firmware to bypass BMC inspection and bypass the signature verification process
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SMCI | MBD-X12DPG-OA6 |
Version: 1.04.16 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-10237", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T14:38:05.372240Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-04T14:38:14.400Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "BMC" ], "product": "MBD-X12DPG-OA6", "vendor": "SMCI", "versions": [ { "status": "affected", "version": "1.04.16", "versionType": "BMC" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThere is a vulnerability in the BMC firmware image authentication design \n\n at Supermicro MBD-X12DPG-OA6\n\n. An attacker can modify the firmware to bypass BMC inspection and bypass the signature verification process\u003c/span\u003e" } ], "value": "There is a vulnerability in the BMC firmware image authentication design \n\n at Supermicro MBD-X12DPG-OA6\n\n. An attacker can modify the firmware to bypass BMC inspection and bypass the signature verification process" } ], "impacts": [ { "capecId": "CAPEC-137", "descriptions": [ { "lang": "en", "value": "CAPEC-137: Parameter Injection" } ] }, { "capecId": "CAPEC-166", "descriptions": [ { "lang": "en", "value": "CAPEC-166: Forced Rewriting" } ] }, { "capecId": "CAPEC-192", "descriptions": [ { "lang": "en", "value": "CAPEC-192: Manipulation of Sensitive Data" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-347", "description": "CWE-347: Improper Verification of Cryptographic Signature", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345: Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-02-04T07:59:26.354Z", "orgId": "def9a96e-e099-41a9-bfac-30fd4f82c411", "shortName": "Supermicro" }, "references": [ { "url": "https://www.supermicro.com/en/support/security_BMC_IPMI_Jan_2025" } ], "source": { "discovery": "UNKNOWN" }, "title": "SMC BMC Firmware Image Authentication Design Issue", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "def9a96e-e099-41a9-bfac-30fd4f82c411", "assignerShortName": "Supermicro", "cveId": "CVE-2024-10237", "datePublished": "2025-02-04T07:59:26.354Z", "dateReserved": "2024-10-22T03:14:14.274Z", "dateUpdated": "2025-02-04T14:38:14.400Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }