Home > 详细页 > 安全公告详细

Security Advisory - BMC ASPEED and some other security vulnerabilities

  • SA No INSPUR-SA-201907-001
  • Initial Release Date 2019-07-11 14:12:09
  • last Release Date 2020-05-22 17:01:05
  • Source Common Vulnerabilities and Exposures
  • Potential Security Impact Allows attackers to use the host to access BMC memory and flash without authentication.
Vulnerability Summary

The ASPEED ast2400 and ast2500 Baseband Management Controller (BMC) hardware and firmware implement Advanced High-performance Bus (AHB) bridges, which allow arbitrary read and write access to the BMC's physical address space from the host (or from the network in unusual cases where the BMC console uart is attached to a serial concentrator),so there may be security risks. Besides, we found that the SNMP of a few products has security risks and may be exploited by attackers in some extreme cases.
The affected products and corresponding update versions are shown in the table below.

Vulnerability Scoring Details

CVE: CVE-2019-2121
Base Score : 9.8(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
CVSS Temporal Score: 8.8 (E:P/RL:O/RC:C)

Fixed Product Version
Product BMC Update Version
NF5180M5 NF5180M5_BMC_4.15.3_Standard_20190709
NF5280M5 NF5280M5_BMC_4.25.2_Standard_20190709
NF5266M5 NF5266M5_BMC_3.16.0_Standard_20190725
NF5270M5 NF5270M5_BMC_4.7.1_Standard_20190727
SA5112M5 SA5112M5_BMC_4.15.3_Standard_20190709
SA5212M5 SA5212M5_BMC_4.25.2_Standard_20190709
NF8480M5 NF8480M5_BMC_1.19.13_Standard_20190802
NF5468M5 NF5468M5_BMC_1.18.38_Standard_20190731
NX5460M5 NX5460M5_BMC_1.16.55_Standard_20190903
i48 i48_BMC_1.16.56_Standard_20190918
i24 NS5162M5_BMC_4.3.0_Standard_20190831
NF5888M5 NF5888M5_BMC_1.18.39_Standard_20190929
NF8260M5 NF8260M5_BMC_1.19.23_Standard_20191118
NF5466M5 NF5466M5_BMC_4.17.1_Standard_20191107


Inspur provides method to update CPU Microcode of its various products as mentioned in the table above.Download your product’s corresponding BIOS image and perform the BIOS upgrade.
Please visit the Support Center site for updates on the applicable products.

Revision History

20190711-V1.0-Initial Release


For issues about implementing the recommendations of this Security Bulletin, contact normal Inspur Services Support channel. For other issues about the content of this Security Bulletin, send e-mail to sec@inspur.com.


To initiate a subscription to receive future Inspur Security Bulletin via Email:Subscribe to Security Bulletins


To report a potential security vulnerability for Inspur product: Reporting a Security Vulnerability


Inspur shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, Inspur disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement. In no event shall Inspur or any of its directly or indirectly controlled subsidiaries or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. Your use of the document, by whatsoever means, will be totally at your own risk. Inspur is entitled to amend or update this document from time to time.