メインコンテンツに移動
AMD Security Bulletin AMD-SB-6016, February 2025

Vulnerability Disclosure:

Supermicro is aware of and is addressing the security vulnerabilities in the Satellite Management Controller (SMC) in AMD Instinct™ MI300X Accelerators. These vulnerabilities could potentially cause denial of service and/or data corruption.

CVE:

  • CVE-2024-21927
    • Severity: Medium
  • CVE-2024-21935
    • Severity: Medium
  • CVE-2024-21936
    • Severity: High

Findings:

CVE-2024-21927:
Improper input validation in Satellite Management Controller (SMC) may allow an attacker with privileges to use certain special characters in manipulated Redfish® API commands, causing service processes like OpenBMC to crash and reset, potentially resulting in denial of service.
CVE-2024-21935:
Improper input validation in Satellite Management Controller (SMC) may allow an attacker with privileges to manipulate Redfish® API commands to remove files from the local root directory, potentially resulting in data corruption.
CVE-2024-21936:
Improper input validation in Satellite Management Controller (SMC) may allow an attacker with privileges to send multiple manipulated Redfish® API commands, causing service processes like OpenBMC to crash and reset, potentially resulting in denial of service.

Affected products:

AMD MotherboardBIOS Version with the fix
H13 MI300X (H13DSG-OM)Not affected
AMD ServerGPU Firmware Bundle/BKC
H13 AS-8125GS-TNMR2 (H13DSG-OM)v 24.12

Remediation:

  • All affected Supermicro motherboard SKUs will require a GPU firmware update to mitigate this potential vulnerability.
  • An updated GPU firmware has been created to mitigate this potential vulnerability. Supermicro is currently testing and validating affected products. Please check Release Notes for the resolution.