Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7623: CWE-121: Stack-based Buffer Overflow in SMCI MBD-X13SEDW-F

0
Medium
VulnerabilityCVE-2025-7623cvecve-2025-7623cwe-121
Published: Tue Nov 18 2025 (11/18/2025, 07:05:21 UTC)
Source: CVE Database V5
Vendor/Project: SMCI
Product: MBD-X13SEDW-F

Description

Stack-based buffer overflow in the SMASH-CLP shell. An authenticated attacker with SSH access to the BMC can exploit a stack buffer overflow via a crafted SMASH command, overwrite the return address and registers, and achieve arbitrary code execution on the BMC firmware operating system

AI-Powered Analysis

AILast updated: 11/18/2025, 07:31:34 UTC

Technical Analysis

CVE-2025-7623 is a stack-based buffer overflow vulnerability identified in the SMASH-CLP shell component of the SMCI SYS-111C-NR Baseboard Management Controller (BMC) firmware, specifically affecting version 01.04.11. The vulnerability arises from improper bounds checking on a 260-byte stack buffer when processing SMASH commands via SSH. An attacker with authenticated SSH access to the BMC can send a specially crafted SMASH command that overflows this buffer, overwriting the return address and CPU registers on the stack. This memory corruption enables arbitrary code execution within the BMC's firmware operating system context. The BMC is a critical management interface that operates independently of the host OS, providing out-of-band management capabilities such as power control, hardware monitoring, and firmware updates. Exploiting this vulnerability could allow attackers to gain persistent control over the BMC, potentially bypassing host OS security controls and facilitating lateral movement within the network. The CVSS v3.1 base score is 5.4 (medium), reflecting network attack vector, low attack complexity, required privileges (authenticated SSH access), no user interaction, unchanged scope, no confidentiality impact, but partial integrity and availability impacts. No public exploits or patches are currently available, but the vulnerability was reserved in July 2025 and published in November 2025. The vulnerability is classified under CWE-121 (stack-based buffer overflow), a common and dangerous memory corruption flaw that can lead to code execution. Given the critical role of BMCs in server management, this vulnerability poses a significant risk to data center and enterprise environments using the affected SMCI hardware.

Potential Impact

For European organizations, exploitation of CVE-2025-7623 could lead to unauthorized code execution on the BMC, compromising the integrity and availability of server management functions. This could result in attackers disabling or manipulating hardware controls, disrupting server operations, or using the BMC as a foothold for further network intrusion. Since BMCs operate independently of the host OS, traditional endpoint security measures may not detect or prevent exploitation. This risk is particularly acute for data centers, cloud providers, and enterprises relying on SMCI SYS-111C-NR servers for critical infrastructure. The partial integrity impact could allow attackers to alter management commands or firmware settings, while availability impact could cause denial of management services, complicating incident response and recovery. Although confidentiality impact is rated none, the ability to execute arbitrary code on the BMC could indirectly lead to data exposure if attackers pivot to other systems. The requirement for authenticated SSH access limits the attack surface but underscores the importance of strict access controls and monitoring. European organizations with high-value infrastructure and regulatory requirements for operational security must treat this vulnerability seriously to avoid service disruptions and potential compliance violations.

Mitigation Recommendations

1. Restrict SSH access to the BMC strictly to trusted administrators via network segmentation, firewall rules, and VPNs to minimize exposure. 2. Implement strong authentication mechanisms for BMC access, such as multi-factor authentication and robust password policies. 3. Monitor BMC SSH logs and SMASH command usage for anomalous or unexpected activity indicative of exploitation attempts. 4. Disable or limit SMASH-CLP shell access if not required for operational purposes to reduce the attack surface. 5. Maintain an inventory of affected SMCI SYS-111C-NR devices and track firmware versions to identify vulnerable systems. 6. Prepare to apply vendor patches immediately upon release; engage with SMCI support channels for updates or workarounds. 7. Employ network intrusion detection systems (NIDS) tuned to detect unusual BMC traffic patterns or malformed SMASH commands. 8. Conduct regular security assessments and penetration tests focusing on BMC interfaces to validate controls. 9. Educate system administrators on the risks of BMC vulnerabilities and enforce strict operational procedures for remote management. 10. Consider isolating BMC management networks physically or logically from production networks to contain potential compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Supermicro
Date Reserved
2025-07-14T06:39:34.861Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c1f0d91aee3c1015f0391

Added to database: 11/18/2025, 7:23:57 AM

Last enriched: 11/18/2025, 7:31:34 AM

Last updated: 11/18/2025, 8:26:38 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats