Latest Supermicro BMC vulnerabilities #

Supermicro has issued a vulnerability disclosure for a critical vulnerability in "select X11, X12, H12, B12, X13, H13, and B13 motherboards (and CMM6 modules)". CVE-2024-36435 is rated critical with CVSS score of 9.8, and potentially allows for remote code execution by an unauthenticated user.

    What is the impact? #

    An attacker with remote access to a vulnerable system could send specially crafted requests that could trigger a stack buffer overflow and result in arbitrary remote code execution. 

    Are updates or workarounds available? #

    Supermicro is currently testing and validating BMC firmware updates. According to the disclosure, "As an immediate workaround to reduce the attack surface, it is advised to follow the BMC Configuration Best Practices Guide". They also recommend configuring a session timeout.

    How to find potentially vulnerable systems with runZero # #

    From the Asset Inventory, use the following query to locate systems running potentially vulnerable software:

    (hw:"Super%micro" or os:"Super%micro)

    Written by runZero Team

    Due to the nature of their research and out of respect for their privacy, runZero team members prefer to remain anonymous. Their work is published under the runZero name.

    More about runZero Team
    Subscribe Now

    Get the latest news and expert insights delivered in your inbox.

    Welcome to the club! Your subscription to our newsletter is successful.


    Explore more

    Webcasts
    The Unreasonable Effectiveness of Inside Out Attack Surface Management
    HD Moore, founder of runZero (and previously Metasploit), presents new research that will forever redefine how you approach attack surface...
    Webcasts
    Safeguarding OT/ICS Assets: Insights from the U.S. Department of Energy
    Security experts from the National Renewable Energy Lab’s (NREL) Clean Energy Cybersecurity Accelerator™ (CECA) program join runZero to discuss...
    runZero Insights
    Ensure compliance with DORA’s ICT risk framework using runZero
    Learn how to uncover unmanaged and unknown assets— including IT, OT, and IoT— to meet DORA's hidden risk requirements using runZero.
    Talks
    DEF CON 32: SSHamble: Unexpected Exposures in SSH (Video)
    This talk digs deep into SSH, the lesser-known implementations, many of the surprising security issues found along the way, and how to exploit them.

    See Results in Minutes

    Get complete visibility into IT, OT, & IoT — without agents, credentials, or hardware.

    © Copyright 2025 runZero, Inc. All Rights Reserved