Description
On Supermicro X10 and X11 products, a client's access privileges may be transferred to a different client that later has the same socket file descriptor number. In opportunistic circumstances, an attacker can simply connect to the virtual media service, and then connect virtual USB devices to the server managed by the BMC.
References (3)
Core 3
Core References
Mitigation, Third Party Advisory x_refsource_misc
https://eclypsium.com/2019/09/03/usbanywhere-bmc-vulnerability-opens-servers-to-remote-attack/
Third Party Advisory x_refsource_misc
https://github.com/eclypsium/USBAnywhere
Vendor Advisory x_refsource_misc
https://www.supermicro.com/support/security_BMC_virtual_media.cfm
Scores
CVSS v3
10.0
EPSS
0.0065
EPSS Percentile
71.1%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Details
Status
published
Products (50)
supermicro/a1sa2-2750f_firmware
3.83
supermicro/a1sai-2550f_firmware
3.83
supermicro/a1sai-2750f_firmware
3.83
supermicro/a1sam-2550f_firmware
3.83
supermicro/a1sam-2750f_firmware
3.83
supermicro/a1sri-2358f_firmware
3.83
supermicro/a1sri-2558f_firmware
3.83
supermicro/a1sri-2758f_firmware
3.83
supermicro/a1srm-2558f_firmware
3.83
supermicro/a1srm-2758f_firmware
3.83
... and 40 more
Published
Sep 21, 2019
Tracked Since
Feb 18, 2026