Vulnerabilities > CVE-2014-8272
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
PARTIAL Availability impact
NONE Summary
The IPMI 1.5 functionality in Dell iDRAC6 modular before 3.65, iDRAC6 monolithic before 1.98, and iDRAC7 before 1.57.57 does not properly select session ID values, which makes it easier for remote attackers to execute arbitrary commands via a brute-force attack. <a href="http://cwe.mitre.org/data/definitions/330.html">CWE-330: Use of Insufficiently Random Values</a>
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 | |
Application | 1 |
Exploit-Db
description | Dell iDRAC IPMI 1.5 - Insufficient Session ID Randomness. CVE-2014-8272. Webapps exploit for hardware platform |
file | exploits/hardware/webapps/35770.py |
id | EDB-ID:35770 |
last seen | 2016-02-04 |
modified | 2015-01-13 |
platform | hardware |
port | 623 |
published | 2015-01-13 |
reporter | Yong Chuan, Koh |
source | https://www.exploit-db.com/download/35770/ |
title | Dell iDRAC IPMI 1.5 - Insufficient Session ID Randomness |
type | webapps |
Nessus
NASL family | CGI abuses |
NASL id | DRAC_IPMI_CMD_INJ.NASL |
description | The remote host is running a version of iDRAC that ships with a version of IPMI that does not sufficiently randomize session ID values. An unauthenticated, remote attacker can exploit this to inject arbitrary commands into a privileged session. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 80442 |
published | 2015-01-09 |
reporter | This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/80442 |
title | Dell iDRAC Products IPMI Arbitrary Command Injection Vulnerability |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/129952/dellidrac-randomness.txt |
id | PACKETSTORM:129952 |
last seen | 2016-12-05 |
published | 2015-01-14 |
reporter | Yong Chuan Koh |
source | https://packetstormsecurity.com/files/129952/Dell-iDRAC-IPMI-1.5-Insufficient-Session-ID-Randomness.html |
title | Dell iDRAC IPMI 1.5 Insufficient Session ID Randomness |
Seebug
bulletinFamily | exploit |
description | <p><b>关于 IPMI:</b></p><p>智能平台管理接口 (IPMI) 是一种开放标准的硬件管理接口规格,定义了嵌入式管理子系统进行通信的特定方法。IPMI 信息通过基板管理控制器 (BMC)(位于 IPMI 规格的硬件组件上)进行交流。IPMI是智能型平台管理接口(Intelligent Platform Management Interface)的缩写,是管理基于 Intel结构的企业系统中所使用的外围设备采用的一种工业标准,该标准由英特尔、惠普、NEC、美国戴尔电脑和SuperMicro等公司制定。具体请看:<a href="http://baike.baidu.com/view/1595174.htm">http://baike.baidu.com/view/1595174.htm</a></p><p>简单来说了,有了IPMI这个东西,用户可以利用IPMI监视服务器的物理健康特征,如温度、电压、风扇工作状态、电源状态等,更重要的是可以装系统、开关机、查看操作服务器屏幕输出,就好比站在服务器面前。</p><p><b>IPMI 漏洞:</b></p><p>PMI服务通常运行于 623/udp 端口,最近一个新的 IPMI 漏洞被披露: <a href="https://labs.mwrinfosecurity.com/blog/2015/01/08/cve-2014-8272/" target="_blank">CVE-2014-8272:A Case of Weak Session-ID in Dell iDRAC</a> 。</p><p>除了这个漏洞外,IPMI 还有若干个相关漏洞:</p><ul><li><a href="https://community.rapid7.com/community/metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipmi" target="_blank">A Penetration Tester's Guide to IPMI and BMCs</a>: 这是一篇 rapid7.com 上的文章。</li><li><a href="http://blog.knownsec.com/2014/06/supermicro-ipmi-49152-port-password-leak/" target="_blank">Supermicro IPMI 49152 端口密码泄漏漏洞</a>:这个漏洞我们在 2014 年 06 月进行过报道。</li></ul><p>根据 <a href="https://labs.mwrinfosecurity.com/blog/2015/01/08/cve-2014-8272/" target="_blank">A Case of Weak Session-ID in Dell iDRAC</a> 里给出的 <a href="https://labs.mwrinfosecurity.com/system/assets/833/original/cve-2014-8272_public.py" target="_blank">POC</a> 来看,CVE-2014-8272 漏洞很难批量检测。但在 POC 里若不指定 IPMI 用户名和密码的话,程序会使用默认密码进行检测。所以我们计划进行一次全球检测,以评估全球使用默认密码或者密码容易泄漏的服务器数量。这里我们主要关注 2 个漏洞:</p><ul><li>Supermicro IPMI 49152 端口密码泄漏漏洞:这个漏洞我们在 2014 年 06 月进行过检测,这次我们再次进行检测以评估多少服务器修复了这个漏洞。</li><li>使用了如下已知 IPMI 默认账户:</li></ul><table><colgroup><col width="NaN%"><col width="NaN%"><col width="NaN%"></colgroup><tbody><tr><td>产品名称</td><td>默认用户名</td><td>默认密码</td></tr><tr><td>Supermicro IPMI (2.0) <br></td><td>ADMIN</td><td>ADMIN</td></tr><tr><td>Oracle/Sun Integrated Lights Out Manager (ILOM)<br></td><td>root</td><td>changeme<br></td></tr><tr><td>BM Integrated Management Module (IMM) <br></td><td>USERID<br></td><td>PASSW0RD (with a zero)<br></td></tr><tr><td>HP Integrated Lights Out (iLO)<br></td><td>Administrator<br></td><td>(null)<br></td></tr><tr><td>Fujitsu Integrated Remote Management Controller<br></td><td>admin</td><td>admin<br><br></td></tr><tr><td>Dell Remote Access Card (iDRAC, DRAC) <br></td><td>root</td><td>calvin</td></tr><tr><td>ASUS iKVM BMC<br></td><td>admin</td><td>admin</td></tr></tbody></table><p>举例:</p><p>攻击者可以通过请求服务器49152端口的/PSBlock文件,就可得到80端口web管理界面的密码,密码放在PSBlock文件中,例如:<a href="http://69.73." rel="nofollow">http://69.73.</a><a href="http://69.73."></a>*.*:49152/PSBlock。再访问<a href="http://69.73." rel="nofollow">http://69.73.</a><a href="http://69.73."></a>*.*/登录管理。</p><p>ZoomEye感知:</p><ul><li>Supermicro IPMI 49152 端口密码泄漏漏洞:<br><ul><li>2014 年 06 月 27 日:11,700 个服务器存在漏洞。</li><li>2015 年 01 月 22 日:1,725 个服务器存在漏洞。</li></ul></li><li>IPMI脆弱帐号统计(包括 Supermicro IPMI 49152 端口密码泄漏漏洞), 截止至 2015 年 01 月 22 日 </li></ul><table><colgroup><col width="33.285917496443815%"><col width="33.285917496443815%"><col width="33.57041251778094%"></colgroup><tbody><tr><td>产品名称</td><td>漏洞类型</td><td>数量</td></tr><tr><td>Supermicro IPMI (2.0)<br></td><td>使用默认帐号,但不存在 49152 端口密码泄漏漏洞<br></td><td>3125</td></tr><tr><td>Supermicro IPMI (2.0)<br></td><td>49152 端口密码泄漏漏洞<br></td><td>1725</td></tr><tr><td>Dell Remote Access Card (iDRAC, DRAC)<br></td><td>使用默认帐号<br></td><td>636</td></tr><tr><td>Fujitsu Integrated Remote Management Controller / ASUS iKVM BMC<br></td><td>使用默认帐号<br></td><td>533</td></tr><tr><td>IBM Integrated Management Module (IMM)<br></td><td>使用默认帐号<br></td><td>115</td></tr><tr><td>Oracle/Sun Integrated Lights Out Manager (ILOM)<br></td><td>使用默认帐号<br></td><td>41</td></tr><tr><td>HP Integrated Lights Out (iLO)<br></td><td>使用默认帐号<br></td><td>22</td></tr></tbody></table><p><br></p><p>危害:</p><p>攻击者不需要认证即可获取管理密码,从而登录IPMI管理页面,这个后台拥有操作服务器的最高权限——重装系统,其后果可想而知。</p> |
id | SSV:88846 |
last seen | 2017-11-19 |
modified | 2014-09-12 |
published | 2014-09-12 |
reporter | Root |
source | https://www.seebug.org/vuldb/ssvid-88846 |
title | Supermicro Onboard IPMI Port 49152 敏感文件泄露漏洞 |