Security restrictions bypass in Super Micro Computer, Inc. products - #VU51219

 

Security restrictions bypass in Super Micro Computer, Inc. products - #VU51219

Published: March 3, 2021


Vulnerability identifier: #VU51219
CSH Severity: High
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: N/A
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability: The vulnerability is being exploited in the wild
Vulnerable software:
X10SLH-F
X10SLL-F
X10SLM-F
X10SLL+-F
X10SLM+-F
X10SLM+-LN4F
X10SLA-F
X10SL7-F
X10SLL-S/-SF
Software vendor:
Super Micro Computer, Inc.

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to application does not properly impose security restrictions in BIOS firmware for X10 UP-series (H3 Single Socket “Denlow”) motherboard. A local user can plant malware into motherboard firmware and establish permanent persistence on the system, even if OS is reinstalled.

Note, the vulnerability is being actively exploited in the wild by the TrickBoot malware.


Remediation

Install updates from vendor's website.

External links