Supermicro server motherboards can be infected with unremovable malware

Scope of the Vulnerability

  • Some argue “every modern motherboard comes with unremovable malware” in practice, because opaque flash regions and management controllers are outside user control.
  • Others stress this case is not about hidden chips, but a bug in a documented, flagship feature: signed firmware updates for the BMC/IPMI interface.

Secure Boot, Verified Boot, and Root of Trust

  • One camp claims Secure Boot (in the broad, PC sense) is currently the only widely deployed way to meaningfully resist such persistent infections.
  • Others counter that if the BMC can overwrite system firmware and has memory access, it can:
    • Re-enroll arbitrary Secure Boot keys.
    • Replace measured images after verification or fake TPM PCR measurements.
  • Consensus emerges that:
    • The true root of trust must sit before and outside the firmware the BMC can overwrite.
    • TPM measurements can at best make tampering conspicuous, not reliably prevent it.

Relation to the Bloomberg “Big Hack” Story

  • Most see this firmware issue as distinct from Bloomberg’s hardware-implant claims.
  • Debate over Bloomberg:
    • Some say the described tiny chip on BMC flash lines is technically plausible and similar to console modchips.
    • Others note no independent evidence was ever produced and vendors denied it, so it remains unproven.

“Unremovable” and Recovery Options

  • Thread distinguishes:
    • Practically unremovable via normal admin/remote means.
    • Technically removable by hardware intervention: JTAG, SPI clips, socketed SOIC chips, or desoldering.
  • Many consider desoldering or chip-level work unrealistic for normal IT, thus effectively “unremovable.”
  • Proposed mitigations:
    • Socketed or removable flash; physical write-protect jumpers/switches.
    • Dual-firmware or ROM+reflasher fallback designs.
    • Strong, independent roots of trust (e.g., Caliptra-like) and modular BMC cards (DC-SCM).

BMC Access, Networks, and Trust

  • One view: “If an attacker has BMC admin, you’ve already lost.”
  • Pushback: even admin shouldn’t be able to install irreversible hardware-level backdoors; future admins must be able to recover without board surgery.
  • Strong agreement that BMCs should live on isolated management networks, but:
    • Supermicro’s defaults that bond BMC to main NIC when its port is unused are seen as dangerous and surprising.
    • This raises concerns about tenants or rogue admins planting persistent backdoors in rented bare-metal servers.

Quality and Alternatives to BMC Firmware

  • Widespread belief that BMC stacks (across vendors) are low-quality, vulnerability-prone embedded software with poor economics for hardening and uneven patch uptake.
  • OpenBMC is viewed positively but isn’t widely used on Supermicro yet; some vendors are transitioning toward it.
  • Some note many platforms either lack enforced signatures or allow signature bypasses, enabling arbitrary firmware (including malware) to be flashed.
  • Suggestions and experiments:
    • BMC-less boards for high-security customers.
    • Fully open, vertically integrated server platforms with service processors and open firmware.
    • More formal kernels (e.g., seL4) are mentioned but seen as impractical for current BMC hardware and ecosystems.

Broader Sentiment

  • Frustration that it’s “near impossible” to buy servers without deeply privileged, opaque management backdoors.
  • Mixed reaction: some normalize it as industry-wide behavior; others see it as a fundamental, unresolved security failure.