CVE-2023-35861

9.8 CRITICAL

📋 TL;DR

CVE-2023-35861 is a shell injection vulnerability in Supermicro motherboard BMC email notifications that allows remote attackers to execute arbitrary commands as root. This affects Supermicro H12DST-B motherboards with BMC firmware before version 03.10.35. Attackers can gain complete control over the BMC, which manages the server hardware.

💻 Affected Systems

Products:
  • Supermicro H12DST-B motherboards
Versions: BMC firmware versions before 03.10.35
Operating Systems: Any OS running on affected motherboards
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in BMC firmware, independent of host operating system. Requires SMTP/email notification feature to be configured.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of BMC with root access, allowing attackers to install persistent backdoors, manipulate hardware settings, intercept traffic, or brick the server.

🟠

Likely Case

Remote code execution leading to data theft, lateral movement within the network, or cryptomining deployment.

🟢

If Mitigated

Limited impact if network segmentation isolates BMC interfaces and strict access controls are implemented.

🌐 Internet-Facing: HIGH - BMC interfaces exposed to internet are directly exploitable without authentication.
🏢 Internal Only: HIGH - Even internally, any network access to BMC interface can lead to compromise.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires network access to BMC interface. Public technical details available in security blogs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: BMC firmware 03.10.35 or later

Vendor Advisory: https://www.supermicro.com/en/support/security_SMTP_Jun_2023

Restart Required: Yes

Instructions:

1. Download latest BMC firmware from Supermicro support site. 2. Log into BMC web interface. 3. Navigate to Maintenance > Firmware Update. 4. Upload and apply firmware update. 5. Reboot BMC after update completes.

🔧 Temporary Workarounds

Disable SMTP/Email Notifications

linux

Temporarily disable email notification feature to prevent exploitation vector

ipmitool raw 0x32 0x6a 0x20 0x00 0x00 0x00 0x00 0x00 0x00 0x00

Network Segmentation

all

Isolate BMC interfaces to dedicated management network

🧯 If You Can't Patch

  • Implement strict network access controls to BMC interfaces (firewall rules, VLAN segmentation)
  • Disable SMTP/email notification functionality in BMC settings

🔍 How to Verify

Check if Vulnerable:

Check BMC firmware version via web interface or IPMI command: ipmitool mc info | grep 'Firmware Revision'

Check Version:

ipmitool mc info | grep 'Firmware Revision'

Verify Fix Applied:

Confirm firmware version is 03.10.35 or higher using same command

📡 Detection & Monitoring

Log Indicators:

  • Unusual BMC login attempts
  • SMTP configuration changes in BMC logs
  • Unexpected command execution in BMC audit logs

Network Indicators:

  • Unusual traffic to BMC IPMI port (623/UDP, 443/TCP)
  • SMTP traffic from BMC to unexpected destinations

SIEM Query:

source="BMC" AND (event="configuration_change" OR event="command_execution")

🔗 References

📤 Share & Export