Firmware Update for Security Vulnerabilities: AMI MegaRAC SPX 12

CVE-2022-26872, CVE-2022-40242, CVE-2022-40258, CVE-2023-28863, CVE-2023-34329, CVE-2023-34330, CVE-2023-34337, CVE-2023-34338, CVE-2023-34471, CVE-2023-34472, CVE-2023-34473
Mar 04, 2024

Giga Computing Technology Co., Ltd. acknowledges the security vulnerabilities affecting GIGABYTE’s server products that are using the following BMCs and users are suggested updating to the latest version as shown in the bracket:

 

        ASPEED AST2500 (Arm) (12.61.06)

        ASPEED AST2500 (x86) (12.61.17)

        ASPEED AST2500 (x86 with Mini-DP) (12.83.48)

 

To mitigate the risk of exploitation, GIGABYTE has released new firmware versions for the vulnerabilities as listed below. Updated firmware versions to address the threats are available on all affected product pages.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2022-26872

Severity Rating (CVSSv3.1): High

Description: AMI Megarac Password reset interception via API.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2022-40242

Severity Rating (CVSSv3.1): Critical

Description: MegaRAC Default Credentials Vulnerability.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2022-40258

Severity Rating (CVSSv3.1): Medium

Description: AMI Megarac Weak password hashes for Redfish & API.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2023-28863

Severity Rating (CVSSv3.1): Critical

Description: AMI MegaRAC SPx12 and SPx13 devices have Insufficient Verification of Data Authenticity.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2023-34329

Severity Rating (CVSSv3.1): High

Description: AMI MegaRAC SPx12 contains a vulnerability in BMC where a User may cause an authentication bypass by spoofing the HTTP header. A successful exploit of this vulnerability may lead to loss of confidentiality, integrity, and availability.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2023-34330

Severity Rating (CVSSv3.1): High

Description: AMI SPx contains a vulnerability in the BMC where a user may inject code which could be executed via a Dynamic Redfish Extension interface. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity, and availability.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2023-34337

Severity Rating (CVSSv3.1): High

Description: AMI SPx contains a vulnerability in the BMC where a user may cause an inadequate encryption strength by hash-based message authentication code (HMAC). A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity, and availability.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2023-34338

Severity Rating (CVSSv3.1): Critical

Description: AMI SPx contains a vulnerability in the BMC where an Attacker may cause a use of hard-coded cryptographic key by a hard-coded certificate. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity, and availability.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2023-34471

Severity Rating (CVSSv3.1): High

Description: AMI SPx contains a vulnerability in the BMC where a user may cause a missing cryptographic step by generating a hash-based message authentication code (HMAC). A successful exploit of this vulnerability may lead to the loss confidentiality, integrity, and authentication.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2023-34472

Severity Rating (CVSSv3.1): Medium

Description: AMI SPx contains a vulnerability in the BMC where an Attacker may cause an improper neutralization of CRLF sequences in HTTP Headers. A successful exploit of this vulnerability may lead to a loss of integrity.

 

Common Vulnerabilities or Exposures (CVEID): CVE-2023-34473

Severity Rating (CVSSv3.1): High

Description: AMI SPx contains a vulnerability in the BMC where a valid user may cause a use of hard-coded credentials. A successful exploit of this vulnerability may lead to a loss of confidentiality, integrity, and availability.

 

AMI Security Advisory ID: AMI-SA-2023001, AMI-SA-2023003, AMI-SA-2023006

 

 

*Please navigate to the "Support" section of the relevant product page to download the updated firmware.

*For any further assistance regarding this issue please contact your Giga Computing sales representative, or create a new support ticket at https://esupport.gigabyte.com