CVE-2023-31035

7.5 HIGH

📋 TL;DR

This vulnerability in NVIDIA DGX A100 SBIOS allows attackers to trigger SMI callouts that could execute arbitrary code at the System Management Mode (SMM) level. This affects NVIDIA DGX A100 systems, potentially leading to complete system compromise. Attackers could gain privileged access to the underlying hardware.

💻 Affected Systems

Products:
  • NVIDIA DGX A100
Versions: All versions prior to the patched SBIOS version
Operating Systems: Any OS running on affected DGX A100 hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the SBIOS firmware, affecting the hardware regardless of operating system. Requires access to the system's management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining SMM-level privileges, allowing persistent malware installation, bypassing all security controls, and accessing all system memory and hardware.

🟠

Likely Case

Privilege escalation from lower privilege levels to SMM, enabling attackers to bypass operating system security controls and install persistent malware.

🟢

If Mitigated

Limited impact if proper network segmentation, access controls, and monitoring are in place to prevent unauthorized physical or network access to vulnerable systems.

🌐 Internet-Facing: LOW - This vulnerability requires local access or network access to the BMC/IPMI interface, which should not be internet-facing in properly configured environments.
🏢 Internal Only: HIGH - If attackers gain internal network access, they could exploit this vulnerability to compromise critical infrastructure systems running vulnerable DGX A100 hardware.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires specialized knowledge of SMM vulnerabilities and access to the system's management interface. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SBIOS version with fix available through NVIDIA support

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5510

Restart Required: Yes

Instructions:

1. Contact NVIDIA support for the patched SBIOS version. 2. Follow NVIDIA's firmware update procedures for DGX A100. 3. Reboot the system after firmware update. 4. Verify the SBIOS version has been updated.

🔧 Temporary Workarounds

Restrict Management Interface Access

all

Limit network access to the BMC/IPMI interface to only authorized management networks and systems.

Configure firewall rules to restrict access to DGX A100 management IP addresses on ports 623 (IPMI) and 443 (web interface)

Implement Strong Authentication

linux

Ensure strong, unique passwords are set for all management interfaces and enable multi-factor authentication if supported.

ipmitool user set password <user_id> <new_password>
Configure BMC authentication policies via web interface

🧯 If You Can't Patch

  • Isolate vulnerable systems in a dedicated network segment with strict access controls
  • Implement network monitoring and intrusion detection for management interface traffic

🔍 How to Verify

Check if Vulnerable:

Check current SBIOS version via IPMI or BMC web interface. If running a version prior to the patched version, the system is vulnerable.

Check Version:

ipmitool mc info | grep 'Firmware Revision' or check via BMC web interface under System Information

Verify Fix Applied:

Verify SBIOS version has been updated to the patched version through the BMC web interface or IPMI commands.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SMI callouts in system logs
  • Unauthorized access attempts to BMC/IPMI interface
  • Unexpected system reboots or firmware update attempts

Network Indicators:

  • Unusual traffic to port 623 (IPMI) from unauthorized sources
  • Multiple failed authentication attempts to management interface

SIEM Query:

source="*bmc*" OR source="*ipmi*" AND (event_type="authentication_failed" OR event_type="firmware_update")

🔗 References

📤 Share & Export