Skip to main content
PixieFAIL Vulnerability, January 2024

Findings:

Supermicro is aware of a potential vulnerability known as “PixieFAIL” in the BIOS firmware. Multiple vulnerabilities were discovered in the TCP/IP stack (NetworkPkg) of Tianocore EDKII, an open source implementation of UEFI. These nine vulnerabilities that if exploited via network can lead to remote code execution, DoS attacks, DNS cache poisoning, and/or potential leakage of sensitive information.

CVE:

CVEDescriptionCVSS Severity
CVE-2023-45229Integer underflow in DHCPv6 Advertise messageMedium
CVE-2023-45230Buffer overflow in the DHCPv6 clientHigh
CVE-2023-45231Out of Bounds read in Ip6ProcessRedirectMedum
CVE-2023-45232Infinite loop in Ip6IsExtsValid.High
CVE-2023-45233Infinite loop in Ip6IsOptionValid High
CVE-2023-45234Buffer overflow with DNS Servers option in a DHCPv6 Advertise message.High
CVE-2023-45235Buffer overflow with Server ID option in DHCPv6 proxy Advertise message.High
CVE-2023-45236Predictable TCP Initial Sequence Numbers (ISNsHigh
CVE-2023-45237Weak PseudoRandom Number GeneratorHigh

Affected products:

X12-TatlowBIOS version with the Fix
X12STW1.8
X12STH1.8
X12STD1.8
X12STE1.8
X12STL-IF1.8
X12STL-F1.8
B3ST11.8
X12/C9-RocketlakeBIOS version with the Fix
X12SAE-51.5a
X12SCA-5F1.5a
C9Z590-CG(W)1.5a
X12/C9-CometlakeBIOS version with the Fix
X12SAE/X12SCA-F2.0a
X12SCQ2.0a
X12SCV-LVDS2.0a
X12SCV-W2.0a
X12SCZ-TLN4F/QF/F2.0a
C9Z490-PGW2.0a
X12-IdavilleBIOS version with the Fix
X12SDV-SPT4F1.7
X12SDV-SP6F1.7
X12SDV-SPT8F1.7
B3SD11.7
X12-TigerLakeBIOS version with the Fix
X12STN1.6
X12-WhitleyBIOS version with the Fix
B12DPE-61.9
B12DPT-61.9
B12SPE-CPU1.9
X12DAi-N61.9
X12DGO-61.9
X12DGQ-R1.9
X12DPG-AR1.9
X12DPG-OA61.9
X12DPG-OA6-GD21.9
X12DPG-QR1.9
X12DPG-QBT61.9
X12DPG-QT61.9
X12DPG-U61.9
X12DPi-N(T)61.9
X12DPL-i6/NT61.9
X12DDW-A61.9
X12DGU1.9
X12DHM-61.9
X12DPD-A/AM251.9
X12DPFR-AN61.9
X12DPT-B61.9
X12DPT-PT6/-PT461.9
X12DPU-61.9
X12DSC-61.9
X12DSC-A61.9
X12SPO-(NT)F1.9
X12SPM Series1.9
X12SPW-(T)F, X12SPW-(T)F-0011.9
X12SPL-LN4F1.9
X12SPZ-SPLN6F/LN4F1.9
X12SPi-TF 2.001.9
X12SPA-TF 1.011.9
X12SPED-F 1.011.9
X12SPG-NF1.9
X12SPT-PT1.9
X12SPT-G©1.9
X12DPi1.9
X12-CedarIslandBIOS version with the Fix
X12QCH+1.9
X11-BakervilleBIOS version with the Fix
B2SD22.1
X11SDC2.1
X11SDV-TLN2F2.1
X11SDV-TP8F2.1
X11SDW-TP13F2.1
X11SDW-TP13F+2.1
X11SDD2.1
X11SDS2.1
X11-PurleyBIOS version with the Fix
X11SPi-TF4.3
X11SPG-TF4.3
X11SPH-nCT(P)F4.3
X11SPL-F4.3
X11SPM-(T)F/TPF4.3
X11SPW-(C)TF4.3
X11DPi-N/NT/Ni4.3
X11DAi-N4.3
X11DGQ-R4.3
X11DPG-HGX24.3
X11DPG-OT4.3
X11DPS-RE4.3
X11DAC4.3
X11DGO4.3
X11QPH+4.3
X11QPL4.3
X11OPi4.3
B11DPT4.3
B11DPE4.3
B11QPI/-T4.3
X11DPD-L/M254.3
X11DPG-QT (32MB)4.3
X11DPG-QT (64MB)4.3
X11DPL-i4.3
X11DPU4.3
X11DPU-V4.3
X11DPU-R4.3
X11DPX-T4.3
X11DSC+4.3
X11DDW-L/N(T)4.3
X11DPFF-SN4.3
X11DPFR-S(N)4.3
X11DPH-T(Q)(F)4.3
X11DPT-B4.3
X11DPT-PS4.3
X11DPU-Z+4.3
B11SPE4.3
X11-Whiskeylake-UBIOS version with the Fix
X11SWN2.1
X11-Mehlow_ServerBIOS version with the Fix
X11SCW2.3
X11SCD2.3
X11SCM2.3
X11SCL-LN4F2.3
X11SCE2.3
X11SCH2.3
X11SCL-F2.3
X11SCL2.3
X11-Mehlow_WorkstationBIOS version with the Fix
X11SCA-F2.4
X11SCQ/L2.4
X11SCV-Q/L2.4
X11SCZ-F/Q2.4
B2SC12.4
B2SC22.4
B11SCG-CTF2.4
B11SCG-ZTF2.4
A3-JacobsvilleBIOS version with the Fix
A3SPI-4C/8C-LN6PF/HLN4F1.3
A3SSV-8C/16C/24C-SPLN10F1.3
A3-ElkHart LakeBIOS version with the Fix
A3SEV1.6
A2-DenvertonBIOS version with the Fix
A2SDi-H-T(P4)F1.9a
A2SDi-HLN4F1.9a
A2SDi-TP8F/LN4F1.9a
A2SDV-LN8F/LN10PF1.9a
A2SDV-TLN5F1.9a
A2SD1-3750F/3955F1.9a
H11-Naples/RomeBIOS version with the Fix
H11SSL-i/(N)C2.9
H11SSW-NT/iN2.9
H11DSU-I(N)2.9
H11DSI-(N)T2.9
H11DST-B2.9
H12-Rome/MilanBIOS version with the Fix
H12SSFF-AN62.8
H12DST-B2.8
H12SSG-ANP6TBD
H12DSI-N6/NT62.8
H12SSW-iN/NT2.8
H12DGO-6TBD
H12DSG-O-CPUTBD
H12SSL-i/C/CT/NT2.8
H12DGQ-NT6TBD
H12DSG-Q-CPU6TBD
H12SSW-INR/NTR2.8
H12SSW-iNL/NTL2.8
H12SSW-AN6TBD
H12SST-PS2.8
H12DSU-iN2.8
H12DSU-iNR2.8
H12SSG-AN62.8
H12SSFR-AN62.8
BH12SSi-M25TBD
H13-GenoaBIOS version with the Fix
H13SSL-N/NC1.7
H13SSW1.7
H13SST-G/GC1.7
H13SSF1.7
H13SSH1.7
H13DSH1.7
H13DSG-O-CPU1.7
H13DSG-O-CPU-D1.7
H13-SienaBIOS version with the Fix
H13SVWTBD
R12 ARMBIOS version with the Fix
R12SPD-A/-M1.2
R12SPD-R1.2

Mitigation:

Supermicro is currently working on updating BIOS firmware to mitigate this issue. Please check the release notes for resolution.

Exploitation and Public Announcement:

Supermicro is not aware of any public announcements or malicious use of these vulnerabilities that is described in this advisory.