CVE-2023-40284

8.3 HIGH

📋 TL;DR

This Cross-Site Scripting (XSS) vulnerability affects Supermicro X11SSM-F, X11SAE-F, and X11SSE-F BMC/IPMI firmware version 1.66. An attacker could inject malicious scripts into web interfaces, potentially compromising BMC management sessions. Organizations using these specific Supermicro server boards with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • Supermicro X11SSM-F
  • Supermicro X11SAE-F
  • Supermicro X11SSE-F
Versions: BMC/IPMI firmware version 1.66
Operating Systems: Any OS using affected BMC
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects specific motherboard models with exact firmware version 1.66; other versions may be unaffected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete BMC compromise allowing attacker to execute arbitrary commands, modify firmware, access host system, or pivot to other network segments.

🟠

Likely Case

Session hijacking, credential theft, or defacement of BMC web interface leading to unauthorized management access.

🟢

If Mitigated

Limited to interface manipulation without deeper system access if proper network segmentation and authentication controls exist.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities typically require user interaction (clicking malicious link) but can be combined with other attacks for broader impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Supermicro advisory for latest patched version

Vendor Advisory: https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023

Restart Required: Yes

Instructions:

1. Download latest BMC firmware from Supermicro support site. 2. Log into BMC web interface. 3. Navigate to Maintenance > Firmware Update. 4. Upload and apply firmware update. 5. Reboot BMC after update completes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate BMC/IPMI interfaces to management VLAN only, blocking external access.

Web Interface Restrictions

all

Implement Content Security Policy headers or disable unnecessary BMC web features if supported.

🧯 If You Can't Patch

  • Restrict BMC network access to trusted management IPs only using firewall rules.
  • Implement strong authentication and session management for BMC access.

🔍 How to Verify

Check if Vulnerable:

Log into BMC web interface, navigate to System Information > Firmware Version, check if version is exactly 1.66.

Check Version:

ipmitool mc info | grep 'Firmware Revision' (if IPMI tools configured)

Verify Fix Applied:

After updating, verify firmware version in System Information shows a version higher than 1.66.

📡 Detection & Monitoring

Log Indicators:

  • Unusual BMC login attempts
  • Multiple failed authentication attempts
  • Suspicious URL parameters in BMC access logs

Network Indicators:

  • Unexpected traffic to BMC ports (623/UDP, 443/TCP)
  • HTTP requests with script tags to BMC interface

SIEM Query:

source="BMC_logs" AND (url="*<script>*" OR status=403)

🔗 References

📤 Share & Export