Servers running on motherboards sold by Supermicro contain high-severity vulnerabilities that can allow hackers to remotely install malicious firmware that runs even before the operating system, making infections impossible to detect or remove without unusual protections in place.
One of the two vulnerabilities is the result of an incomplete patch Supermicro released in January, said Alex Matrosov, founder and CEO of Binarly, the security firm that discovered it. He said that the insufficient fix was meant to patch CVE-2024-10237, a high-severity vulnerability that enabled attackers to reflash firmware that runs while a machine is booting. Binarly discovered a second critical vulnerability that allows the same sort of attack.
“Unprecedented persistence”
Such vulnerabilities can be exploited to install firmware similar to ILObleed, an implant discovered in 2021 that infected HP Enterprise servers with wiper firmware that permanently destroyed data stored on hard drives. Even after administrators reinstalled the operating system, swapped out hard drives, or took other common disinfection steps, ILObleed would remain intact and reactivate the disk-wiping attack. The exploit the attackers used in that campaign had been patched by HP four years earlier but wasn’t installed in the compromised devices.
“Both issues provide unprecedented persistence power across significant Supermicro device fleets including [in] AI data centers,” Matrasov wrote to Ars in an online interview, referring to the two latest vulnerabilities Binarly discovered. “After they patched [the earlier vulnerability], we looked at the rest of the attack surface and found even worse security problems.”
The two new vulnerabilities—tracked as CVE-2025-7937 and CVE-2025-6198—reside inside silicon soldered onto Supermicro motherboards that run servers inside data centers. Baseboard management controllers (BMCs) allow administrators to remotely perform tasks such as installing updates, monitoring hardware temperatures, and setting fan speeds accordingly. BMCs also enable some of the most sensitive operations, such as reflashing the firmware for the UEFI (Unified Extensible Firmware Interface) that’s responsible for loading the server OS when booting. BMCs provide these capabilities and more, even when the servers they’re connected to are turned off.
Given their extraordinary power, BMCs ship with protections that are designed to check the digital signatures of installed firmware to ensure it’s authorized by the manufacturer and safe to run. The vulnerabilities Binarly discovered allow hackers to replace safe firmware images with malicious ones without tripping mechanisms for detecting and blocking such attacks.
In such exploits, the attacker would first need to take control of the BMC. Posts Binarly published last year here and here describe vulnerabilities that Matrasov said can be exploited to do just that.
He wrote:
If a potential attacker already has administrative access to the BMC control interface (it is possible by exploitation of other vulnerabilities, which we described in blogs 1, 2), then the exploitation is trivial—we just need to perform an update with a malicious image. In this case, an attacker benefits from exploitation of CVE-2025-7937/CVE-2025-6198 because the compromise becomes persistent.
Alternatively, it is possible that malicious updates could be distributed as part of the supply chain attack. For example, if the servers used to host firmware updates are compromised, attackers can replace the original images with malicious ones. In that case, victims would think that the downloaded firmware updates were trustworthy, and no verification on the BMC side would prevent the malicious updates.
CVE-2025-7937 stems from an incomplete fix for CVE-2024-10237, the vulnerability discovered by Nvidia last year. That vulnerability, in turn, was the result of a flaw in the logic for validating a firmware image after it has been uploaded through the Supermicro BMC. The image gets loaded into a separate chip soldered onto the motherboard (specifically, its Serial Peripheral Interface) that stores UEFI firmware.
After analyzing the patch Supermicro issued in January in response to the Nvidia discovery, Matrasov said, he discovered additional ways the vulnerability could be exploited with even more powerful effects. In a nutshell, exploiting CVE-2024-10237 involved adding custom entries to the fwmap table, which stores memory locations, signatures, and other data crucial for firmware validation. The January fix added two new functions that blocked new entries from being added at specific memory offsets used in the Nvidia PoC. Binarly discovered that the same vulnerability could still be exploited at a different offset.
“This single element will contain all the signed regions of the image, one after the other,” Binarly explained in a post on Tuesday. “To make our exploit useful, we can now replace the area reserved for the original bootloader code with custom content.”
Supermicro said it has updated the BMC firmware to mitigate the vulnerabilities. The company is currently testing and validating affected products. The company went on to advise customers to “check release notes for the resolution.” So far, the status of the update is unknown.
“We can't find the patched firmware updates on their website,” Matrasov said. “The bug is hard to fix. I assume it will take more time from them.”