CVE-2023-31037: CWE-94 Improper Control of Generation of Code ('Code Injection') in NVIDIA Bluefield 2 DPU BMC, BlueField 3 DPU BMC
NVIDIA Bluefield 2 and Bluefield 3 DPU BMC contains a vulnerability in ipmitool, where a root user may cause code injection by a network call. A successful exploit of this vulnerability may lead to code execution on the OS.
AI Analysis
Technical Summary
CVE-2023-31037 is a high-severity vulnerability affecting NVIDIA Bluefield 2 and Bluefield 3 Data Processing Unit (DPU) Baseboard Management Controllers (BMCs). The vulnerability is categorized under CWE-94, which pertains to improper control of code generation, commonly known as code injection. Specifically, the flaw exists in the ipmitool component of the BMC firmware, where a root user can exploit a network call to inject arbitrary code. Successful exploitation results in remote code execution on the underlying operating system of the BMC. Given that BMCs are critical management controllers used for out-of-band management of servers and network devices, this vulnerability can allow an attacker with root privileges on the BMC to execute arbitrary commands, potentially compromising the entire device and the network infrastructure it manages. The affected versions include LTS:2.8.2-46, 23.04, 23.07, and 23.09. The CVSS v3.1 score is 7.2, indicating a high severity level, with attack vector network (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are reported in the wild yet, but the vulnerability's nature and impact warrant immediate attention and patching once available.
Potential Impact
For European organizations, the impact of CVE-2023-31037 can be significant, especially for those relying on NVIDIA Bluefield 2 and 3 DPUs in their data centers, cloud infrastructure, or high-performance computing environments. Compromise of the BMC can lead to full control over the management plane of critical servers, enabling attackers to bypass traditional security controls, manipulate hardware-level settings, or pivot into the internal network. This can result in data breaches, service disruptions, or persistent footholds for advanced persistent threats (APTs). Given the increasing adoption of DPUs for offloading networking and security functions, this vulnerability could undermine the security posture of organizations handling sensitive data, including financial institutions, healthcare providers, and government agencies across Europe. The lack of user interaction and network-based exploitability increase the risk of automated or remote attacks, potentially affecting availability and operational continuity.
Mitigation Recommendations
1. Immediate mitigation involves restricting network access to the BMC interfaces to trusted management networks only, employing network segmentation and strict firewall rules to limit exposure. 2. Enforce strong authentication and authorization policies on BMC access, ensuring that only necessary personnel have root-level privileges. 3. Monitor BMC logs and network traffic for unusual activity indicative of exploitation attempts. 4. Apply firmware updates and patches from NVIDIA as soon as they become available; proactively engage with NVIDIA support or vendor channels to obtain security updates. 5. Implement multi-factor authentication (MFA) for BMC access where supported. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous IPMI or BMC-related traffic. 7. Conduct regular security audits and penetration testing focused on management interfaces to identify and remediate potential weaknesses. 8. Develop incident response plans that include scenarios involving BMC compromise to ensure rapid containment and recovery.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland
CVE-2023-31037: CWE-94 Improper Control of Generation of Code ('Code Injection') in NVIDIA Bluefield 2 DPU BMC, BlueField 3 DPU BMC
Description
NVIDIA Bluefield 2 and Bluefield 3 DPU BMC contains a vulnerability in ipmitool, where a root user may cause code injection by a network call. A successful exploit of this vulnerability may lead to code execution on the OS.
AI-Powered Analysis
Technical Analysis
CVE-2023-31037 is a high-severity vulnerability affecting NVIDIA Bluefield 2 and Bluefield 3 Data Processing Unit (DPU) Baseboard Management Controllers (BMCs). The vulnerability is categorized under CWE-94, which pertains to improper control of code generation, commonly known as code injection. Specifically, the flaw exists in the ipmitool component of the BMC firmware, where a root user can exploit a network call to inject arbitrary code. Successful exploitation results in remote code execution on the underlying operating system of the BMC. Given that BMCs are critical management controllers used for out-of-band management of servers and network devices, this vulnerability can allow an attacker with root privileges on the BMC to execute arbitrary commands, potentially compromising the entire device and the network infrastructure it manages. The affected versions include LTS:2.8.2-46, 23.04, 23.07, and 23.09. The CVSS v3.1 score is 7.2, indicating a high severity level, with attack vector network (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are reported in the wild yet, but the vulnerability's nature and impact warrant immediate attention and patching once available.
Potential Impact
For European organizations, the impact of CVE-2023-31037 can be significant, especially for those relying on NVIDIA Bluefield 2 and 3 DPUs in their data centers, cloud infrastructure, or high-performance computing environments. Compromise of the BMC can lead to full control over the management plane of critical servers, enabling attackers to bypass traditional security controls, manipulate hardware-level settings, or pivot into the internal network. This can result in data breaches, service disruptions, or persistent footholds for advanced persistent threats (APTs). Given the increasing adoption of DPUs for offloading networking and security functions, this vulnerability could undermine the security posture of organizations handling sensitive data, including financial institutions, healthcare providers, and government agencies across Europe. The lack of user interaction and network-based exploitability increase the risk of automated or remote attacks, potentially affecting availability and operational continuity.
Mitigation Recommendations
1. Immediate mitigation involves restricting network access to the BMC interfaces to trusted management networks only, employing network segmentation and strict firewall rules to limit exposure. 2. Enforce strong authentication and authorization policies on BMC access, ensuring that only necessary personnel have root-level privileges. 3. Monitor BMC logs and network traffic for unusual activity indicative of exploitation attempts. 4. Apply firmware updates and patches from NVIDIA as soon as they become available; proactively engage with NVIDIA support or vendor channels to obtain security updates. 5. Implement multi-factor authentication (MFA) for BMC access where supported. 6. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous IPMI or BMC-related traffic. 7. Conduct regular security audits and penetration testing focused on management interfaces to identify and remediate potential weaknesses. 8. Develop incident response plans that include scenarios involving BMC compromise to ensure rapid containment and recovery.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- nvidia
- Date Reserved
- 2023-04-22T02:38:33.414Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68487f5a1b0bd07c3938ab6e
Added to database: 6/10/2025, 6:54:18 PM
Last enriched: 7/10/2025, 11:50:07 PM
Last updated: 7/31/2025, 10:17:58 AM
Views: 16
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.