Severity: Unknown
Description: A shell-injection vulnerability in email notifications on Supermicro motherboards (such as H12DST-B before 03.10.35) allows remote attackers to inject execute arbitrary commands as root on the BMC.
CVSS Score: N/A
D
No data available.
No data available.
1. Risk Assessment
The vulnerability CVE-2023-35861 is a shell-injection flaw in the email notification functionality of Supermicro motherboards, specifically impacting the Baseboard Management Controller (BMC). This allows a remote attacker to inject and execute arbitrary commands as root on the BMC. The business impact can be significant, ranging from denial of service to full compromise of the BMC and potentially the managed server. The likelihood of exploitation is moderate, as the BMC is often accessible remotely and the email notification system provides a convenient attack vector. The ease of exploitation appears to be relatively high, indicated by the "poc" (proof of concept) designation from CISA ADP Vulnrichment, suggesting existing exploits are available or easily developed. Impacts to confidentiality can occur if attackers can exfiltrate BMC configuration data or access server credentials. Integrity is compromised as attackers can modify BMC settings or the server itself. Availability is impacted if attackers cause a denial of service or disrupt BMC management functions. The EPSS score of 0.009720000, while relatively low, still indicates a tangible risk, particularly for organizations heavily reliant on BMC functionality.
2. Potential Attack Scenarios
An attacker could leverage the shell-injection vulnerability to gain root access on the BMC by crafting a malicious email address or subject line that, when processed by the notification system, injects a command. For example, an attacker could send an email with a subject line like “Alert: Server Down; command=reboot” to the BMC's configured email address. The BMC, improperly sanitizing the subject line, would execute the "reboot" command as root. The attacker could then potentially install backdoors, modify firmware, or gain access to server credentials stored on the BMC, leading to full server compromise. The attack vector is network-based, requiring access to the BMC's email notification system. The attack process involves sending a specially crafted email, observing the BMC’s response, and escalating privileges as needed. A successful attack could result in a complete compromise of the managed server, data exfiltration, or denial of service.
3. Mitigation Recommendations
The primary mitigation for CVE-2023-35861 is to upgrade the BMC firmware to version 03.10.35 or later on affected Supermicro motherboards, such as the H12DST-B. This update addresses the shell-injection vulnerability in the email notification system. Organizations should prioritize patching based on the criticality of the servers managed by the affected BMCs. Additional mitigation steps include: segmenting the BMC network to limit lateral movement if compromise occurs; enabling strong authentication for BMC access; and monitoring BMC logs for suspicious activity. Regularly review and update the BMC's email notification configuration to ensure only necessary notifications are enabled. Further information and firmware updates can be found on the Supermicro support website: https://www.supermicro.com/en/support/security_SMTP_Jun_2023 and https://www.supermicro.com/en/products/motherboards.
4. Executive Summary
CVE-2023-35861 is a shell-injection vulnerability affecting Supermicro motherboards, allowing attackers to execute commands as root on the BMC. This vulnerability could lead to server compromise, data theft, or service disruption. The risk is moderate, with a relatively easy exploit path. We recommend upgrading the BMC firmware to version 03.10.35 or later as the primary mitigation step. The BMC is a critical component for server management, and a compromise can have a significant impact on business operations. Prompt patching and ongoing monitoring are crucial to protect against this vulnerability and maintain the integrity and availability of our systems. Delaying remediation could result in significant downtime or data loss.