CVE-2019-16649

10.0 CRITICAL

📋 TL;DR

This vulnerability in Supermicro BMC firmware allows attackers to capture BMC credentials and data transferred over virtual media devices due to encryption and authentication flaws. Attackers can then use these credentials to remotely connect virtual USB devices to servers managed by the BMC. Affected products include Supermicro H11, H12, M11, X9, X10, and X11 series servers with vulnerable BMC firmware.

💻 Affected Systems

Products:
  • Supermicro H11
  • H12
  • M11
  • X9
  • X10
  • X11 series servers
Versions: BMC firmware versions prior to patched versions (varies by model)
Operating Systems: Any OS running on affected servers
Default Config Vulnerable: ⚠️ Yes
Notes: Requires virtual media service to be enabled (often default).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full server compromise allowing attackers to install malware, exfiltrate data, or cause physical damage through virtual USB device connections.

🟠

Likely Case

Credential theft leading to unauthorized BMC access and potential server manipulation.

🟢

If Mitigated

Limited impact if network segmentation and strong authentication are in place.

🌐 Internet-Facing: HIGH - BMC interfaces exposed to internet are directly exploitable.
🏢 Internal Only: HIGH - Internal attackers can exploit this to gain privileged access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit tools available on GitHub. Attack requires network access to BMC interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Varies by model - check Supermicro security advisory for specific versions

Vendor Advisory: https://www.supermicro.com/support/security_BMC_virtual_media.cfm

Restart Required: Yes

Instructions:

1. Identify server model and current BMC firmware version. 2. Download appropriate patched firmware from Supermicro support site. 3. Update BMC firmware following Supermicro documentation. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Disable Virtual Media Service

linux

Temporarily disable the vulnerable virtual media service until patching can be completed.

ipmitool raw 0x32 0x6a 0x20 0x00 0x00 0x00 0x00 0x00 0x00 0x00

Network Segmentation

all

Isolate BMC management interfaces from untrusted networks.

🧯 If You Can't Patch

  • Implement strict network access controls to BMC interfaces
  • Disable virtual media service entirely if not required

🔍 How to Verify

Check if Vulnerable:

Check BMC firmware version against Supermicro's patched versions list. Use ipmitool: ipmitool mc info | grep 'Firmware Revision'

Check Version:

ipmitool mc info | grep 'Firmware Revision'

Verify Fix Applied:

Verify BMC firmware version matches patched version from Supermicro advisory. Test virtual media functionality to ensure it still works securely.

📡 Detection & Monitoring

Log Indicators:

  • Unusual virtual media connection attempts in BMC logs
  • Failed authentication attempts followed by successful connections

Network Indicators:

  • Unexpected traffic to BMC virtual media ports (typically 623/UDP, 5900/TCP)
  • Network scans targeting BMC interfaces

SIEM Query:

source="BMC_logs" AND ("virtual media" OR "USB redirection") AND status="success"

🔗 References

📤 Share & Export