CERT Recently Published Vulnerability Notes 2024年07月06日
VU#163057: BMC software fails to validate IPMI session.
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

多家制造商的基板管理控制器 (BMC) 软件中的智能平台管理接口 (IPMI) 实现存在 IPMI 会话劫持漏洞。攻击者如果能够访问 BMC 网络(启用 IPMI),则可以利用会话完整性缺失来劫持会话并在 BMC 上执行任意 IPMI 命令。

🤔 **IPMI 会话劫持漏洞:** 攻击者可以利用 IPMI 会话中存在的安全漏洞来劫持会话,并执行任意命令。此漏洞源于 BMC 软件在处理 IPMI 会话时存在安全缺陷,攻击者可以利用这些缺陷来预测会话 ID 和 BMC 随机数,从而伪造会话或劫持现有会话。

💻 **潜在影响:** 攻击者可以通过劫持会话,以高权限执行任意命令,例如重启、关机、重新映像机器等。这将对服务器的正常运行和数据安全造成严重威胁。

🛡️ **解决方案:** 为了防止该漏洞被利用,建议采取以下措施: 1. **更新 BMC 软件:** 及时更新 BMC 软件,以修复安全漏洞。 2. **限制访问:** 仅允许来自可信主机和网络的连接访问 BMC 网络,并限制对 IPMI 启用的接口的访问。

🔐 **网络安全措施:** 为了更安全地使用 IPMI,建议将 BMC 网络与其他网络隔离,并使用强密码保护 BMC 的访问权限。

🌐 **供应商信息:** 请参考供应商提供的安全公告,以获取有关如何解决这些漏洞的更多信息。

Overview

The Intelligent Platform Management Interface (IPMI) implementations in multiple manufacturer's Baseboard Management Controller (BMC) software are vulnerable to IPMI session hijacking. An attacker with access to the BMC network (with IPMI enabled) can abuse the lack of session integrity to hijack sessions and execute arbitrary IPMI commands on the BMC.

Description

IPMI is a computer interface specification that provides a low-level management capability independent of hardware, firmware, or operating system. IPMI is supported by many BMC manufacturers to allow for transparent access to hardware. IPMI also supports pre-boot capabilities of a computer such as selection of boot media and boot environment. BMCs are recommended to be accessible via dedicated internal networks to avoid risk of exposure.

IPMI sessions between a client and a BMC follow the RAKP key exchange protocol, as specified in the IPMI 2.0 specification. This involves a session ID and a BMC random number to uniquely identify an IPMI session. The security researcher, who wishes to remain anonymous, has attempted to disclose two vulnerabilities related to BMC software and session management. The first vulnerability identifies the use of weak randomization while interacting with a BMC using IPMI sessions. The researcher discovered that if both the IPMI session ID and BMC's random number are predictable or constant, an attacker can either hijack a session or replay a session without knowing the password that was set to protect the BMC. The second vulnerability from the reporter identifies certain cases where the BMC software fails to enforce previously negotiated IPMI 2.0 session parameters, allowing an attacker to either downgrade or disable session verification. Due to the reuse of software or libraries, these vulnerabilities may be present in multiple models of BMC. It is recommended that sufficient precaution is taken in protecting datacenters and cloud installations with multiple servers to protect IPMI session interaction using both the software updates and the recommendations to secure and isolate the networks where IPMI is accessible.

Impact

An unauthenticated attacker with access to the BMC network can predict IPMI session IDs and/or BMC random numbers to replay a previous session or hijack an IPMI session. This can allow the attacker to inject arbitrary commands into the BMC and be able to perform high-privileged functions (reboot, power-off, re-image of the machine) that are available to the BMC.

Solution

Apply an update

Please consult the Vendor Information section for information provided by BMC vendors to address these vulnerabilities.

Restrict access

As a general good security practice, only allow connections from trusted hosts and networks to the BMC network that exposes the IPMI enabled interface.

Acknowledgements

Thanks to the security researcher who would like to remain anonymous for researching and reporting these vulnerabilities.

This document was written by Ben Koo.

Vendor Information

One or more vendors are listed for this advisory. Please reference the full report for more information.

Other Information

CVE IDs: CVE-2023-28863 CVE-2024-3411
Date Public: 2024-04-30
Date First Published: 2024-04-30
Date Last Updated: 2024-05-17 14:10 UTC
Document Revision: 3

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

IPMI BMC 会话劫持 安全漏洞 网络安全
相关文章