zlacker

[return to "Supermicro server motherboards can be infected with unremovable malware"]
1. dlcarr+3Va[view] [source] 2025-09-28 16:11:28
>>zdw+(OP)
Unremovable through remote access, but reliably removed by reflashing the firmware through JTAG, or whatever interface used during manufacturing to initially load the firmware.
◧◩
2. vetrom+I7b[view] [source] 2025-09-28 17:35:29
>>dlcarr+3Va
bios flashes are typically preflashed prior to soldering to boards -- some vendors route jtag or spi contacts, but you're more likely to need a vampire/pogo clip on for the TSOP or equivalent chip, or have fun with resoldering the bios flash if you're needing to recover from this.

It's not impossible to do in the field, but you can't really count on vendors surfacing that interface usually.

◧◩◪
3. dlcarr+w8c[view] [source] 2025-09-29 03:38:30
>>vetrom+I7b
I've worked with automated EEPROM/Flash programmers (earlier versions of this line: https://www.bpmmicro.com/device-programmers/automated-progra...), and used pre-programming services from distributors, like Digi-Key, but that was the exception. It's almost exclusively faster, cheaper, and easier to load firmware from a test fixture. You need to test the assembly anyway, and it's much easier to update a test procedure, when a new firmware is developed, than to update and track inventory of pre-programmed devices, especially when different firmware versions are needed for different hardware variations.

Pogo pins are only really needed for mass production, especially for reducing repetitive stress injuries. For one-off updates, if a header isn't populated, it's easy to hold an unsoldered header in place, for long enough to flash an update.

[go to top]