CVE-2024-21935

5.0 MEDIUM

📋 TL;DR

This vulnerability allows attackers with existing Redfish API access to manipulate commands and delete files from the local root directory on AMD Satellite Management Controller systems. This could lead to data corruption or system instability. Only systems with AMD SMC and Redfish API access are affected.

💻 Affected Systems

Products:
  • AMD Satellite Management Controller (SMC)
Versions: Specific versions not detailed in advisory; check AMD-SB-6016 for exact affected versions
Operating Systems: Not OS-specific - affects SMC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Redfish API access and attacker privileges; default SMC configurations with Redfish enabled are vulnerable

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Critical system files are deleted, causing complete system failure, data loss, and requiring full system restoration.

🟠

Likely Case

Selective file deletion causing service disruption, configuration loss, or partial data corruption requiring manual recovery.

🟢

If Mitigated

Limited impact due to restricted Redfish API access, with only non-critical files potentially affected.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to Redfish API and knowledge of specific command manipulation techniques

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check AMD-SB-6016 for specific patched firmware versions

Vendor Advisory: https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6016.html

Restart Required: No

Instructions:

1. Review AMD-SB-6016 advisory 2. Download appropriate SMC firmware update 3. Apply update via SMC management interface 4. Verify update completion

🔧 Temporary Workarounds

Restrict Redfish API Access

all

Limit Redfish API access to trusted management networks and authorized users only

Configure network ACLs to restrict SMC Redfish API endpoints
Implement strong authentication for Redfish access

Disable Unnecessary Redfish Features

all

Disable Redfish file manipulation capabilities if not required for operations

Review and disable unnecessary Redfish service extensions in SMC configuration

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SMC management interfaces
  • Enforce least privilege access controls for Redfish API users

🔍 How to Verify

Check if Vulnerable:

Check SMC firmware version against affected versions listed in AMD-SB-6016 advisory

Check Version:

Check via SMC web interface or Redfish API: GET /redfish/v1/Managers/SMC

Verify Fix Applied:

Verify SMC firmware version matches patched version from AMD-SB-6016

📡 Detection & Monitoring

Log Indicators:

  • Unusual Redfish API file deletion commands
  • Multiple failed file manipulation attempts
  • SMC system log entries indicating file removal

Network Indicators:

  • Suspicious Redfish API POST/PATCH requests to file-related endpoints
  • Unusual traffic patterns to SMC management interface

SIEM Query:

source="smc_logs" AND (event="file_deletion" OR command="delete_file")

🔗 References

📤 Share & Export