{"id":1795,"date":"2025-09-23T18:00:00","date_gmt":"2025-09-23T18:00:00","guid":{"rendered":"https:\/\/infosec-daily.com\/?page_id=1795"},"modified":"2025-09-23T18:00:00","modified_gmt":"2025-09-23T18:00:00","slug":"two-new-supermicro-bmc-bugs-allow-malicious-firmware-to-evade-root-of-trust-security","status":"publish","type":"page","link":"https:\/\/infosec-daily.com\/?page_id=1795","title":{"rendered":"Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security"},"content":{"rendered":"<p>Cybersecurity researchers have disclosed details of two security vulnerabilities impacting Supermicro Baseboard Management Controller (BMC) firmware that could potentially allow attackers to bypass crucial verification steps and update the system with a specially crafted image.<br \/>\nThe medium-severity vulnerabilities, both of which stem from improper verification of a cryptographic signature, are<\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity researchers have disclosed details of two security vulnerabilities impacting Supermicro Baseboard Management Controller (BMC) firmware that could potentially allow attackers to bypass crucial verification steps and update the system&hellip;<\/p>\n","protected":false},"author":1,"featured_media":1796,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"saved_in_kubio":false,"footnotes":""},"class_list":["post-1795","page","type-page","status-publish","has-post-thumbnail","hentry"],"kubio_ai_page_context":{"short_desc":"","purpose":"general"},"_links":{"self":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/1795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1795"}],"version-history":[{"count":0,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/pages\/1795\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec-daily.com\/index.php?rest_route=\/wp\/v2\/media\/1796"}],"wp:attachment":[{"href":"https:\/\/infosec-daily.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}