{"id":5598,"date":"2025-09-23T19:28:05","date_gmt":"2025-09-23T19:28:05","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/09\/23\/two-new-supermicro-bmc-bugs-allow-malicious-firmware-to-evade-root-of-trust-security\/"},"modified":"2025-09-23T19:28:05","modified_gmt":"2025-09-23T19:28:05","slug":"two-new-supermicro-bmc-bugs-allow-malicious-firmware-to-evade-root-of-trust-security","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/09\/23\/two-new-supermicro-bmc-bugs-allow-malicious-firmware-to-evade-root-of-trust-security\/","title":{"rendered":"Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security"},"content":{"rendered":"<p>\u200bCybersecurity researchers have disclosed details of two security vulnerabilities impacting Supermicro Baseboard Management Controller (BMC) firmware that could potentially allow attackers to bypass crucial verification steps and update the system with a specially crafted image.<br \/>\nThe medium-severity vulnerabilities, both of which stem from improper verification of a cryptographic signature, are\u00a0Cybersecurity researchers have disclosed details of two security vulnerabilities impacting Supermicro Baseboard Management Controller (BMC) firmware that could potentially allow attackers to bypass crucial verification steps and update the system with a specially crafted image.<br \/>\nThe medium-severity vulnerabilities, both of which stem from improper verification of a cryptographic signature, are\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bCybersecurity researchers have disclosed details of two security vulnerabilities impacting Supermicro Baseboard Management Controller (BMC) firmware that could potentially allow attackers to bypass crucial verification steps and update the system with a specially crafted image. The medium-severity vulnerabilities, both of which stem from improper verification of a cryptographic signature, are\u00a0Cybersecurity researchers have disclosed details of&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/09\/23\/two-new-supermicro-bmc-bugs-allow-malicious-firmware-to-evade-root-of-trust-security\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Two New Supermicro BMC Bugs Allow Malicious Firmware to Evade Root of Trust Security<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":5599,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/5598"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=5598"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/5598\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/5599"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=5598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=5598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=5598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}