CVE-2023-40290

8.3 HIGH

📋 TL;DR

This Cross-Site Scripting (XSS) vulnerability affects Supermicro X11SSM-F, X11SAE-F, and X11SSE-F BMC/IPMI firmware version 1.66. Attackers can inject malicious scripts that execute in Internet Explorer 11 on Windows when users access the BMC web interface, potentially compromising BMC credentials and control.

💻 Affected Systems

Products:
  • Supermicro X11SSM-F
  • Supermicro X11SAE-F
  • Supermicro X11SSE-F
Versions: BMC/IPMI firmware version 1.66
Operating Systems: Windows with Internet Explorer 11
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects BMC web interface access via Internet Explorer 11 on Windows. Other browsers and operating systems may not be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full BMC compromise allowing attacker to execute arbitrary commands, modify firmware, access host system, or cause denial of service through BMC manipulation.

🟠

Likely Case

Session hijacking, credential theft, or unauthorized BMC configuration changes leading to partial system compromise.

🟢

If Mitigated

Limited impact with proper network segmentation, browser restrictions, and authentication controls preventing successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires user interaction (visiting malicious link or page) and Internet Explorer 11 on Windows. No authentication bypass required but needs user to be logged into BMC interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to firmware version 1.67 or later

Vendor Advisory: https://www.supermicro.com/en/support/security_BMC_IPMI_Oct_2023

Restart Required: Yes

Instructions:

1. Download latest firmware from Supermicro support site. 2. Log into BMC web interface. 3. Navigate to Maintenance > Firmware Update. 4. Upload firmware file. 5. Apply update and wait for automatic reboot.

🔧 Temporary Workarounds

Restrict BMC Interface Access

all

Limit BMC network access to management VLAN only and restrict to authorized IPs

Browser Restrictions

windows

Block Internet Explorer 11 access to BMC interface or enforce modern browser usage

🧯 If You Can't Patch

  • Isolate BMC management network from user networks and internet
  • Implement strict access controls and monitor BMC interface access logs

🔍 How to Verify

Check if Vulnerable:

Check BMC firmware version in web interface under Maintenance > Firmware Information

Check Version:

ipmitool mc info | grep 'Firmware Revision' (Linux) or check web interface

Verify Fix Applied:

Confirm firmware version shows 1.67 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unusual BMC web interface access patterns
  • Multiple failed login attempts followed by script-like requests

Network Indicators:

  • HTTP requests with suspicious script tags or encoded payloads to BMC IP

SIEM Query:

source="BMC_logs" AND (http_uri CONTAINS "<script>" OR http_uri CONTAINS "javascript:")

🔗 References

📤 Share & Export