Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security
News

Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security

Team-CWDBy Team-CWDOctober 2, 2025No Comments4 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Cybersecurity researchers have disclosed details of two security vulnerabilities impacting Supermicro Baseboard Management Controller (BMC) firmware that could potentially allow attackers to bypass crucial verification steps and update the system with a specially crafted image.

The medium-severity vulnerabilities, both of which stem from improper verification of a cryptographic signature, are listed below –

  • CVE-2025-7937 (CVSS score: 6.6) – A crafted firmware image can bypass the Supermicro BMC firmware verification logic of Root of Trust (RoT) 1.0 to update the system firmware by redirecting the program to a fake “fwmap” table in the unsigned region
  • CVE-2025-6198 (CVSS score: 6.4) – A crafted firmware image can bypass the Supermicro BMC firmware verification logic of the Signing Table to update the system firmware by redirecting the program to a fake signing table (“sig_table”) in the unsigned region

The image validation process carried out during a firmware update takes place over three steps: Retrieve the public key from the BMC SPI flash chip, process the “fwmap” or “sig_table” table embedded in the uploaded image, and compute a cryptographic hash digest of all “signed” firmware regions, and verify the signature value against the calculated hash digest.

Firmware security company Binarly, which has been credited with discovering and reporting the two shortcomings, said CVE-2025-7937 is a bypass for CVE-2024-10237, which was disclosed by Supermicro in January 2025. The vulnerability was originally discovered by NVIDIA, alongside CVE-2024-10238 and CVE-2024-10239.

CVE-2024-10237 is a “logical flaw in the validation process of the uploaded firmware, which could ultimately result in the BMC SPI chip being reflashed with a malicious image,” Binarly researcher Anton Ivanov said in a report shared with The Hacker News. “This security issue could allow potential attackers to gain complete and persistent control of both the BMC system and the main server OS.”

“This vulnerability demonstrated that the validation process could be manipulated by adding custom entries to the ‘fwmap’ table and relocating the original signed content of the image to unreserved firmware space, which ensures that the calculated digest still matches the signed value.”

On the other hand, CVE-2024-10238 and CVE-2024-10239 are two stack overflow flaws in the firmware’s image verification function, allowing an attacker to execute arbitrary code in the BMC context.

Binarly’s analysis found the fix for CVE-2024-10237 to be insufficient, identifying a potential attack pathway by which a custom “fwmap” table can be inserted before the original one, which is then used during the validation process. This essentially enables the threat actor to run custom code in the context of the BMC system.

CIS Build Kits

Further investigation into the implementation of the firmware validation logic in the X13SEM-F motherboard determined a flaw within the “auth_bmc_sig” function that could permit an attacker to load a malicious image without modifying the hash digest value.

“Once again, as all the regions used for the digest calculation are defined in the uploaded image itself (in the ‘sig_table’), it is possible to modify it, along with some other parts of the image – for example, the kernel – and move the original data to unused space in the firmware,” Ivanov said. “This means that the signed data digest will still match the original value.”

Successful exploitation of CVE-2025-6198 can not only update the BMC system with a specially crafted image, but also get around the BMC RoT security feature.

“Previously, we reported the discovery of the test key on Supermicro devices, and their PSIRT doubled down that the hardware RoT (Root of Trust) authenticates the key and has no impact on this discovery,” Alex Matrosov, CEO and Head of REsearch at Binarly, told The Hacker News.

“However, new research shows that the previous statement from Supermicro is not accurate, and CVE-2025-6198 bypasses the BMC RoT. In this case, any leak of the signing key will impact the entire ecosystem. Reusing the signing key is not the best approach, and we recommend at least rotating the signing keys per product line. Based on previous incidents like PKfail and the Intel Boot Guard key leakage, the reuse of cryptographic signing keys could cause an industry-wide impact.”



Source

computer security cyber attacks cyber news cyber security news cyber security news today cyber security updates cyber updates data breach hacker news hacking news how to hack information security network security ransomware malware software vulnerability the hacker news
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleEurojust Arrests 5 in €100M Cryptocurrency Investment Fraud Spanning 23 Countries
Next Article New China-Aligned Hackers Hit State and Telecom Sectors
Team-CWD
  • Website

Related Posts

News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

What is it, and how do I get it off my device?

September 11, 2025

Chronology of a Skype attack

February 5, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.