Description
On Supermicro H11, H12, M11, X9, X10, and X11 products, a combination of encryption and authentication problems in the virtual media service allows capture of BMC credentials and data transferred over virtual media devices. Attackers can use captured credentials to connect virtual USB devices to the server managed by the BMC.
References (3)
Core 3
Core References
Third Party Advisory x_refsource_misc
https://eclypsium.com/2019/09/03/usbanywhere-bmc-vulnerability-opens-servers-to-remote-attack/
Third Party Advisory x_refsource_misc
https://github.com/eclypsium/USBAnywhere
Vendor Advisory x_refsource_misc
https://www.supermicro.com/support/security_BMC_virtual_media.cfm
Scores
CVSS v3
10.0
EPSS
0.0014
EPSS Percentile
33.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-522
CWE-287
CWE-326
Status
published
Products (50)
supermicro/a1sa2-2750f_firmware
3.83
supermicro/a1sai-2550f_firmware
3.83
supermicro/a1sai-2750f_firmware
3.83
supermicro/a1sam-2550f_firmware
3.83
supermicro/a1sam-2750f_firmware
3.83
supermicro/a1sri-2358f_firmware
3.83
supermicro/a1sri-2558f_firmware
3.83
supermicro/a1sri-2758f_firmware
3.83
supermicro/a1srm-2558f_firmware
3.83
supermicro/a1srm-2758f_firmware
3.83
... and 40 more
Published
Sep 21, 2019
Tracked Since
Feb 18, 2026