https://www.golem.de/news/supermicro-diskussion-um-ueberwachungschips-1810-136965.html

https://www.heise.de/security/meldung/Bericht-Winzige-Chips-spionierten-in-Cloud-Servern-von-Apple-und-Amazon-4181461.html

Now a day backdors are already on the silicon level (inside chips). They are declared as debugging interfaces..


It looks like at least the reengineering of the frimware an it is analyzing of the code could increase security wholes

https://resources.infosecinstitute.com/reversing-firmware-part-1/#gref


I am curious if someone on this list had tried to do it and had achieved helpfull results..


On 15.06.19 17:11, Stuart Henderson wrote:
On 2019-06-15, ms <m...@it-infrastrukturen.org> wrote:
There were some serious security issues with hardware and software from
Supermicro (espionage chips, firmware)
Assuming you mean the allegations in that Bloomberg piece, there was no
evidence found supporting them.

https://hackaday.com/2019/05/14/what-happened-with-supermicro/ etc

There are the usual problems with BMC security, cpu bugs, etc, but those
are by no means unique to supermicro.



Reply via email to