
Two weaknesses affecting the firmware of supermacro hardware, including the Baseboard Management Controller (BMC), allow the attackers to update the system with maliciously designed images.
Supermicro is the manufacturer of server, motherboard and data center hardware. The BMC supermacro server is a microcontroller on the server motherboard that allows distance system monitoring and management even when the system is operated.
Experts at the firmware security company discovered a bypass for a defect (Cve-2024-10237) That supermacico identified as CVE -2025-6198 with another weakness in January this year.
“This safety issue may allow potential assailants to achieve complete and frequent control of both BMC systems and main servers OS,” binrally researchers say.
Both security issues can be used to update the BMC system with informal firmware, but researchers say that the CVE-2025-6198 BMC ROT (Root of Trust) can be exploited Ales to bypass Ales-a security facility that the system is being booted with legal firms.
The malicious firmware planting enables firmness during the ribbut and the OS re-install, the server’s high-level control and trusted bypass of safety checks.
To fix cve-2024-10237, Supermicro Added check To restrict custom Stuck Entries, which are a table of instructions inside the firmware image, which can be benefited to manipulate firmware images.

Source: Binarly
However, binarly researchers Discovered It was still possible to inject a malicious Stuck Before the vendor’s origin is loaded by the system, the signed areas are declared in such a way that the attacker allows to move or replace the real material while keeping the attacker consistent.
This means that the calculated is equal to the signed value and the signature verification is successful, even if the parts in the firmware image have been swap or replaced.

Source: Binarly
As a result, BMC admits and shines, while starting a potential malicious bootloader or kernel, while everything still appears signed and valid.
Researchers revealed the issue to SuperMicro. The company confirmed the vulnerability, which is identified as now Cve-2025-7937,
The second bug that was discovered without cve-2025-6198 is generated by a flawed argument. Author_bmc_sig Function, executed in the op-TE environment of the X13sem-F motherboard firmware.
Since the signed areas are defined in the image uploaded, attackers can modify kernels or other areas and transfer basic data to unused firmware location, and keep digestion valid.
Researchers demonstrated the shining and execution of a customized kernel, showing that the kernel authentication is not performed during the boot, which means that the trust’s route only protects the process.

Source: Binarly
Exploitation of vulnerability receives the same result as a bypass, allows injection of malicious firmware or downgrade to reduce the existing image.
Supermicro has released Firmware fix For the affected model. Binarly has released proof-of-concept Exploitation for both issuesTherefore, early action is required to protect the potentially affected systems.
BMC firmware defects are persistent and may be particularly dangerous, in some cases the mass of the server causes the bunch. These problems are also not theoretical, as CISA has first identified the exploitation of such insects in the wild.


