supermicro CVE Vulnerabilities & Metrics

Focus on supermicro vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About supermicro Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with supermicro. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total supermicro CVEs: 15
Earliest CVE date: 08 Jul 2013, 22:55 UTC
Latest CVE date: 07 Dec 2023, 18:15 UTC

Latest CVE reference: CVE-2023-33413

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical supermicro CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 5.52

Max CVSS: 10.0

Critical CVEs (≥9): 8

CVSS Range vs. Count

Range Count
0.0-3.9 7
4.0-6.9 3
7.0-8.9 3
9.0-10.0 8

CVSS Distribution Chart

Top 5 Highest CVSS supermicro CVEs

These are the five CVEs with the highest CVSS scores for supermicro, sorted by severity first and recency.

All CVEs for supermicro

CVE-2023-33413 supermicro vulnerability CVSS: 0 07 Dec 2023, 18:15 UTC

The configuration functionality in the Intelligent Platform Management Interface (IPMI) baseboard management controller (BMC) implementation on Supermicro X11 and M11 based devices, with firmware versions through 3.17.02, allows remote authenticated users to execute arbitrary commands.

CVE-2023-33412 supermicro vulnerability CVSS: 0 07 Dec 2023, 18:15 UTC

The web interface in the Intelligent Platform Management Interface (IPMI) baseboard management controller (BMC) implementation on Supermicro X11 and M11 based devices, with firmware versions before 3.17.02, allows remote authenticated users to execute arbitrary commands via a crafted request targeting vulnerable cgi endpoints.

CVE-2023-33411 supermicro vulnerability CVSS: 0 07 Dec 2023, 18:15 UTC

A web server in the Intelligent Platform Management Interface (IPMI) baseboard management controller (BMC) implementation on Supermicro X11 and M11 based devices, with firmware versions up to 3.17.02, allows remote unauthenticated users to perform directory traversal, potentially disclosing sensitive information.

CVE-2023-34853 supermicro vulnerability CVSS: 0 22 Aug 2023, 19:16 UTC

Buffer Overflow vulnerability in Supermicro motherboard X12DPG-QR 1.4b allows local attackers to hijack control flow via manipulation of SmcSecurityEraseSetupVar variable.

CVE-2023-35861 supermicro vulnerability CVSS: 0 31 Jul 2023, 13:15 UTC

A shell-injection vulnerability in email notifications on Supermicro motherboards (such as H12DST-B before 03.10.35) allows remote attackers to inject execute arbitrary commands as root on the BMC.

CVE-2022-43309 supermicro vulnerability CVSS: 0 07 Apr 2023, 21:15 UTC

Supermicro X11SSL-CF HW Rev 1.01, BMC firmware v1.63 was discovered to contain insecure permissions.

CVE-2021-22887 supermicro vulnerability CVSS: 2.1 16 Mar 2021, 16:15 UTC

A vulnerability in the BIOS of Pulse Secure (PSA-Series Hardware) models PSA5000 and PSA7000 could allow an attacker to compromise BIOS firmware. This vulnerability can be exploited only as part of an attack chain. Before an attacker can compromise the BIOS, they must exploit the device.

CVE-2020-15046 supermicro vulnerability CVSS: 9.3 24 Jun 2020, 23:15 UTC

The web interface on Supermicro X10DRH-iT motherboards with BIOS 2.0a and IPMI firmware 03.40 allows remote attackers to exploit a cgi/config_user.cgi CSRF issue to add new admin users. The fixed versions are BIOS 3.2 and firmware 03.88.

CVE-2013-3620 supermicro vulnerability CVSS: 5.0 02 Jan 2020, 18:15 UTC

Hardcoded WSMan credentials in Intelligent Platform Management Interface (IPMI) with firmware for Supermicro X9 generation motherboards before 3.15 (SMT_X9_315) and firmware for Supermicro X8 generation motherboards before SMT X8 312.

CVE-2013-3619 supermicro vulnerability CVSS: 4.3 02 Jan 2020, 18:15 UTC

Intelligent Platform Management Interface (IPMI) with firmware for Supermicro X9 generation motherboards before SMT_X9_317 and firmware for Supermicro X8 generation motherboards before SMT X8 312 contain harcoded private encryption keys for the (1) Lighttpd web server SSL interface and the (2) Dropbear SSH daemon.

CVE-2019-19642 supermicro vulnerability CVSS: 9.0 08 Dec 2019, 04:15 UTC

On SuperMicro X8STi-F motherboards with IPMI firmware 2.06 and BIOS 02.68, the Virtual Media feature allows OS Command Injection by authenticated attackers who can send HTTP requests to the IPMI IP address. This requires a POST to /rpc/setvmdrive.asp with shell metacharacters in ShareHost or ShareName. The attacker can achieve a persistent backdoor.

CVE-2019-16650 supermicro vulnerability CVSS: 7.5 21 Sep 2019, 02:15 UTC

On Supermicro X10 and X11 products, a client's access privileges may be transferred to a different client that later has the same socket file descriptor number. In opportunistic circumstances, an attacker can simply connect to the virtual media service, and then connect virtual USB devices to the server managed by the BMC.

CVE-2019-16649 supermicro vulnerability CVSS: 5.0 21 Sep 2019, 02:15 UTC

On Supermicro H11, H12, M11, X9, X10, and X11 products, a combination of encryption and authentication problems in the virtual media service allows capture of BMC credentials and data transferred over virtual media devices. Attackers can use captured credentials to connect virtual USB devices to the server managed by the BMC.

CVE-2019-13131 supermicro vulnerability CVSS: 7.5 01 Jul 2019, 16:15 UTC

Super Micro SuperDoctor 5, when restrictions are not implemented in agent.cfg, allows remote attackers to execute arbitrary commands via NRPE.

CVE-2018-13787 supermicro vulnerability CVSS: 7.2 09 Jul 2018, 18:29 UTC

Certain Supermicro X11S, X10, X9, X8SI, K1SP, C9X299, C7, B1, A2, and A1 products have a misconfigured Descriptor Region, allowing OS programs to modify firmware.

CVE-2013-3623 supermicro vulnerability CVSS: 10.0 10 Dec 2013, 16:11 UTC

Multiple stack-based buffer overflows in cgi/close_window.cgi in the web interface in the Intelligent Platform Management Interface (IPMI) with firmware before 3.15 (SMT_X9_315) on Supermicro X9 generation motherboards allow remote attackers to execute arbitrary code via the (1) sess_sid or (2) ACT parameter.

CVE-2013-3622 supermicro vulnerability CVSS: 9.0 10 Dec 2013, 16:11 UTC

Buffer overflow in logout.cgi in the Intelligent Platform Management Interface (IPMI) with firmware before 3.15 (SMT_X9_315) on Supermicro X9 generation motherboards allows remote authenticated users to execute arbitrary code via the SID parameter.

CVE-2013-3609 supermicro vulnerability CVSS: 10.0 08 Sep 2013, 03:17 UTC

The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices relies on JavaScript code on the client for authorization checks, which allows remote authenticated users to bypass intended access restrictions via a crafted request, related to the PrivilegeCallBack function.

CVE-2013-3608 supermicro vulnerability CVSS: 10.0 08 Sep 2013, 03:17 UTC

The web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allows remote authenticated users to execute arbitrary commands via shell metacharacters, as demonstrated by the IP address field in config_date_time.cgi.

CVE-2013-3607 supermicro vulnerability CVSS: 10.0 08 Sep 2013, 03:17 UTC

Multiple stack-based buffer overflows in the web interface in the Intelligent Platform Management Interface (IPMI) implementation on Supermicro H8DC*, H8DG*, H8SCM-F, H8SGL-F, H8SM*, X7SP*, X8DT*, X8SI*, X9DAX-*, X9DB*, X9DR*, X9QR*, X9SBAA-F, X9SC*, X9SPU-F, and X9SR* devices allow remote attackers to execute arbitrary code on the Baseboard Management Controller (BMC), as demonstrated by the (1) username or (2) password field in login.cgi.

CVE-2013-4782 supermicro vulnerability CVSS: 10.0 08 Jul 2013, 22:55 UTC

The Supermicro BMC implementation allows remote attackers to bypass authentication and execute arbitrary IPMI commands by using cipher suite 0 (aka cipher zero) and an arbitrary password.