Learn about CVE-2022-42289, a HIGH severity vulnerability in NVIDIA BMC, allowing attackers to execute arbitrary shell commands. Find mitigation steps and update details here.
This article provides details about CVE-2022-42289, a vulnerability found in NVIDIA BMC affecting NVIDIA DGX servers.
Understanding CVE-2022-42289
CVE-2022-42289 is a vulnerability in the SPX REST API of NVIDIA BMC that allows an authorized attacker to inject arbitrary shell commands, potentially resulting in code execution, denial of service, information disclosure, and data tampering.
What is CVE-2022-42289?
NVIDIA BMC contains a vulnerability in the SPX REST API, allowing an attacker to inject arbitrary shell commands.
The Impact of CVE-2022-42289
The impact includes Code Execution, Denial of Service, Information Disclosure, and Data Tampering.
Technical Details of CVE-2022-42289
The CVSS score for CVE-2022-42289 is 7.2, with a base severity rating of HIGH. The attack complexity is LOW, and it requires high privileges for exploitation. The vulnerability affects all BMC firmware versions prior to 00.19.07.
Vulnerability Description
The vulnerability allows an attacker to execute arbitrary shell commands.
Affected Systems and Versions
NVIDIA DGX servers with BMC firmware versions prior to 00.19.07 are affected.
Exploitation Mechanism
Authorized attackers can inject shell commands through the SPX REST API, leading to various potential attacks.
Mitigation and Prevention
To prevent exploitation of CVE-2022-42289, immediate steps must be taken followed by long-term security practices.
Immediate Steps to Take
Update BMC firmware to version 00.19.07 or later. Restrict network access to BMC interfaces.
Long-Term Security Practices
Regularly monitor for unauthorized access and unusual activities on the BMC. Implement network segmentation.
Patching and Updates
Stay informed about security patches for NVIDIA DGX servers and apply them promptly.