CVE-2023-25531

7.6 HIGH

📋 TL;DR

This vulnerability in NVIDIA DGX H100 BMC's IPMI allows attackers to exploit insufficient credential protection, potentially leading to code execution, denial of service, information disclosure, or privilege escalation. It affects users of NVIDIA DGX H100 systems with vulnerable BMC firmware. Exploitation requires network access to the BMC interface.

💻 Affected Systems

Products:
  • NVIDIA DGX H100
Versions: BMC firmware versions prior to the patched version specified in NVIDIA advisory
Operating Systems: Not applicable; vulnerability is in BMC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with default IPMI configurations on the BMC; ensure BMC is not unnecessarily exposed to untrusted networks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full control over the BMC, executes arbitrary code, disrupts system operations, steals sensitive credentials, and escalates privileges to compromise the entire DGX H100 system.

🟠

Likely Case

Attackers with network access to the BMC may exploit this to steal credentials or cause denial of service, leading to operational downtime and potential data exposure.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is limited to isolated BMC incidents, preventing broader system compromise.

🌐 Internet-Facing: HIGH if BMC is exposed to the internet, as it allows remote exploitation without authentication in some scenarios.
🏢 Internal Only: MEDIUM if BMC is only accessible internally, but still poses risk from insider threats or lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation may not require authentication, making it easier for attackers with network access; refer to NVIDIA advisory for specific details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NVIDIA advisory for specific BMC firmware version

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5473

Restart Required: Yes

Instructions:

1. Review NVIDIA advisory at the provided URL. 2. Download the updated BMC firmware from NVIDIA. 3. Apply the firmware update following NVIDIA's instructions. 4. Restart the BMC to activate the patch.

🔧 Temporary Workarounds

Restrict BMC Network Access

linux

Limit access to the BMC IPMI interface to trusted networks only using firewall rules.

iptables -A INPUT -p tcp --dport 623 -s trusted_ip -j ACCEPT
iptables -A INPUT -p tcp --dport 623 -j DROP

🧯 If You Can't Patch

  • Isolate the BMC on a dedicated, restricted network segment to minimize exposure.
  • Monitor BMC logs for suspicious activity and implement strong authentication mechanisms if supported.

🔍 How to Verify

Check if Vulnerable:

Check the BMC firmware version via IPMI tools (e.g., ipmitool) and compare against the patched version in the NVIDIA advisory.

Check Version:

ipmitool mc info | grep 'Firmware Revision'

Verify Fix Applied:

After patching, verify the BMC firmware version has been updated to the patched version using ipmitool or similar.

📡 Detection & Monitoring

Log Indicators:

  • Unusual IPMI authentication failures or successes from untrusted sources in BMC logs
  • Unexpected BMC configuration changes

Network Indicators:

  • Anomalous traffic to BMC IPMI port (default 623) from unauthorized IPs
  • Suspicious IPMI command sequences

SIEM Query:

source="bmc_logs" AND (event_type="authentication_failure" OR event_type="configuration_change") | stats count by src_ip

🔗 References

📤 Share & Export