CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:C/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
97.0%
NVIDIA has released a firmware security update for NVIDIA DGX™ servers. This update addresses security issues in the AMI Baseboard Management Controller (BMC) firmware that may lead to remote code execution, elevation of privileges, or information disclosure. All issues require network access to the BMC of the DGX server. To protect your system, download and install this firmware update through the NVIDIA Enterprise Support Portal. Go to NVIDIA Product Security.
This section summarizes the potential impact that this security update addresses. Descriptions use CWE™, and base scores and vectors use CVSS v3.1 standards.
CVE IDs | Description | Base Score | Vector |
---|---|---|---|
CVE‑2020‑11483 | NVIDIA DGX servers contain a vulnerability in the AMI BMC firmware in which the firmware includes hard-coded credentials, which may lead to elevation of privileges or information disclosure. | 9.8 | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
CVE‑2020‑11484 | NVIDIA DGX servers contain a vulnerability in the AMI BMC firmware in which an attacker with administrative privileges can obtain the hash of the BMC/IPMI user password, which may lead to information disclosure. | 8.4 | AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
CVE‑2020‑11487 | NVIDIA DGX servers contain a vulnerability in the AMI BMC firmware in which the use of a hard-coded RSA 1024 key with weak ciphers may lead to information disclosure. | 8.2 | AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H |
CVE‑2020‑11485 | NVIDIA DGX servers contain a Cross-Site Request Forgery (CSRF) vulnerability in the AMI BMC firmware in which the web application does not sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request, which can lead to information disclosure or code execution. | 8.1 | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H |
CVE‑2020‑11486 | NVIDIA DGX servers contain a vulnerability in the AMI BMC firmware in which software allows an attacker to upload or transfer files that can be automatically processed within the product’s environment, which may lead to remote code execution. | 8.1 | AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H |
CVE‑2020‑11615 | NVIDIA DGX servers contain a vulnerability in the AMI BMC firmware in which it uses a hard-coded RC4 cipher key, which may lead to information disclosure. | 7.5 | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
CVE‑2020‑11488 | NVIDIA DGX servers contain a vulnerability in the AMI BMC firmware in which software does not validate the RSA 1024 public key used to verify the firmware signature, which may lead to information disclosure or code execution. | 6.7 | AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVE‑2020‑11489 | NVIDIA DGX servers contain a vulnerability in the AMI BMC firmware in which default SNMP community strings are used, which may lead to information disclosure. | 6.5 | AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L |
CVE‑2020‑11616 | NVIDIA DGX servers contain a vulnerability in the AMI BMC firmware in which the Pseudo-Random Number Generator (PRNG) algorithm used in the JSOL package that implements the IPMI protocol is not cryptographically strong, which may lead to information disclosure. | 2.9 | AV:A/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N |
The NVIDIA risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk to your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk to your specific configuration.
The following table lists the NVIDIA software products affected, versions affected, and the updated version that includes this security update. Download the updates from NVIDIA Enterprise Support Portal.
CVE IDs Addressed | **Hardware Platform ** | System | Affected Versions | Updated Version |
---|---|---|---|---|
CVE‑2020‑11483 | NVIDIA DGX servers | DGX-1 | All BMC firmware versions prior to 3.38.30 |
BMC firmware 3.38.30
DGX-2 | All BMC firmware versions prior to 1.06.06 | BMC firmware 1.06.06
CVE‑2020‑11484 | NVIDIA DGX servers | DGX-1 | All BMC firmware versions prior to 3.38.30 | BMC firmware 3.38.30
CVE‑2020‑11485 | NVIDIA DGX servers | DGX-1 | All BMC firmware versions prior to 3.38.30 | BMC firmware 3.38.30
CVE‑2020‑11486 | NVIDIA DGX servers | DGX-1 | All BMC firmware versions prior to 3.38.30 |
BMC firmware 3.38.30
CVE‑2020‑11487 | NVIDIA DGX servers | DGX-1 | All BMC firmware versions prior to 3.38.30 | BMC firmware 3.38.30
DGX-2 | All BMC firmware versions prior to 1.06.06 | BMC firmware 1.06.06
DGX A100 | All BMC firmware versions prior to 00.13.16 | BMC firmware 00.13.16
CVE‑2020‑11488 | NVIDIA DGX servers | DGX-1 | All BMC firmware versions prior to 3.38.30 | BMC firmware 3.38.30
DGX-2 | All BMC firmware versions prior to 1.06.06 | BMC firmware 1.06.06
CVE‑2020‑11489 | NVIDIA DGX servers | DGX-1 | All BMC firmware versions prior to 3.38.30 | BMC firmware 3.38.30
DGX-2 | All BMC firmware versions prior to 1.06.06 | BMC firmware 1.06.06
CVE‑2020‑11615 | NVIDIA DGX servers | DGX-1 | All BMC firmware versions prior to 3.38.30 | BMC firmware 3.38.30
CVE‑2020‑11616 | NVIDIA DGX servers | DGX-1 | All BMC firmware versions prior to 3.38.30 | BMC firmware 3.38.30
Notes
Upgrade to the NVIDIA DGX-1 firmware container nvfw-dgx1:20.10.2
, NVIDIA DGX-2 firmware container nvfw-dgx2:20.10.7
, or NVIDIA DGX A100 firmware container nvfw-dgxa100:20.10.9
to get the updated BMC firmware and SBIOS version listed in the table above. Firmware updates are available through the NVIDIA Enterprise Support Portal.
NVIDIA is aware of CVE-2013-4786, which can be mitigated by placing the IPMI management port on a dedicated management LAN or VLAN restricted to trusted administrators to limit connectivity to the BMC, including the web user interface. See Section 12.1.1 in DGX A100 System User Guide (PDF).
To mitigate the security concerns in this bulletin, limit connectivity to the BMC, including the web user interface, to trusted management networks. See Security Updates for the version to install.
NVIDIA thanks following individuals for reporting the issues.
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:C/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
97.0%