CVE-2023-31037

7.2 HIGH

📋 TL;DR

This vulnerability allows root users on NVIDIA Bluefield DPU BMC systems to inject and execute arbitrary code through ipmitool network calls. It affects NVIDIA Bluefield 2 and Bluefield 3 DPU BMC systems, potentially allowing attackers with root access to compromise the operating system.

💻 Affected Systems

Products:
  • NVIDIA Bluefield 2 DPU BMC
  • NVIDIA Bluefield 3 DPU BMC
Versions: All versions prior to patched versions
Operating Systems: BMC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires root access to the BMC system to exploit. The vulnerability is in the ipmitool component of the BMC firmware.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root-level code execution, allowing attackers to install persistent backdoors, exfiltrate sensitive data, or pivot to other systems in the network.

🟠

Likely Case

Privilege escalation from root to full system control, enabling attackers to modify system configurations, install malware, or disrupt DPU operations.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent root users from making malicious ipmitool calls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires root access to the BMC system. The vulnerability is in code injection through ipmitool network calls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to NVIDIA advisory for specific patched versions

Vendor Advisory: https://nvidia.custhelp.com/app/answers/detail/a_id/5511

Restart Required: Yes

Instructions:

1. Check NVIDIA advisory for specific patched firmware versions. 2. Download updated BMC firmware from NVIDIA. 3. Apply firmware update following NVIDIA's documentation. 4. Reboot the DPU system.

🔧 Temporary Workarounds

Restrict ipmitool network access

all

Limit network access to ipmitool services to prevent malicious calls

Configure firewall rules to restrict access to ipmitool ports (typically 623/UDP)

Monitor root user activity

linux

Implement enhanced monitoring of root user actions on BMC systems

Enable detailed audit logging for root user commands and network calls

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate BMC management interfaces
  • Enforce least privilege access controls and monitor all root user activity on BMC systems

🔍 How to Verify

Check if Vulnerable:

Check BMC firmware version against NVIDIA's advisory. Systems with unpatched firmware versions are vulnerable.

Check Version:

ipmitool mc info | grep 'Firmware Revision'

Verify Fix Applied:

Verify BMC firmware has been updated to patched version specified in NVIDIA advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual ipmitool network calls from root users
  • Suspicious command execution patterns in BMC logs

Network Indicators:

  • Unexpected network traffic to ipmitool port 623/UDP from unauthorized sources

SIEM Query:

source="bmc_logs" AND (event="ipmitool" OR port=623) AND user="root" AND command="*injection*"

🔗 References

📤 Share & Export