Home SecurityNetwork Security Thousands of enterprise servers are running vulnerable BMCs, researchers find

Thousands of enterprise servers are running vulnerable BMCs, researchers find

Having the ability to remotely manage and monitor servers even when their main operating system becomes unresponsive is vital to enterprise IT administrators. All server manufacturers provide this functionality in firmware through a set of chips that run independent of the rest of the server and OS. These are known as baseboard management controllers (BMCs) and if they’re not secured properly, they can open the door to highly persistent and hard-to-detect rootkits.

Over the years, security researchers have found and demonstrated vulnerabilities in the BMC implementations of different server manufacturers and attackers have taken advantage of some of them. One recent example is iLOBleed, a malicious BMC implant found in the wild by an Iranian cybersecurity company that targets Hewlett Packard Enterprise (HPE) Gen8 and Gen9 servers, but this is not the only such attack found over the years.

According to an analysis by firmware security firm Eclypsium, 7,799 HPE iLO (HPE’s Integrated Lights-Out) server BMCs are exposed to the internet and most do not appear to be running the latest version of the firmware. When other vulnerabilities were found in the BMC implementation of Supermicro servers in 2019, more than 47,000 publicly exposed Supermicro BMCs from over 90 different countries were exposed. It’s safe to say that across all server vendors, the number of BMC interfaces that can be attacked from the internet is in the tens or hundreds of thousands.

“BMC vulnerabilities are also incredibly common and often overlooked when it comes to updates,” the Eclypsium researchers said in a new blog post following the iLOBleed reports. “Vulnerabilities and misconfigurations can be introduced early in the supply chain before an organization ever takes ownership of a server. Supply chain issues can still exist even after deployment due to vulnerable updates or if adversaries are able to compromise a vendor’s update process. Ultimately, this creates a challenge for enterprises in which there are many vulnerable systems, very high impacts in the case of an attack, and adversaries actively exploiting the devices in the wild.”

The iLOBleed implant

HPE’s iLO technology has existed in HPE servers for over 15 years. It’s implemented as an ARM chip that has its own dedicated network controller, RAM and flash storage. Its firmware includes a dedicated operating system that runs independently of the server’s main operating system. Like all BMCs, HPE iLO is essentially a small computer designed to control a larger computer — the server itself.

Administrators can access iLO through a web-based administration panel that’s served through the BMC’s dedicated network port, or via tools that talk with the BMC over the standardized Intelligent Platform Management Interface (IPMI) protocol. Admins can use iLO to turn the server on and off, tweak various hardware and firmware settings, access the system console, reinstall the main operating system by attaching a CD/DVD image remotely, monitoring hardware and software sensors and even deploy BIOS/UEFI updates.

Copyright © 2022 IDG Communications, Inc.

Source link

Related Articles

Leave a Comment

techhipbettruvabetnorabahisbahis forumutaraftarium24eduedusedusedueduseduedueduedusedus
lüks casino
neyine casino giriş
rokubet giriş
vegabet giriş
rexbet giriş
padişahbet giriş
cashwin giris
kingbetting güncel giriş
plinko romania
betmatik
betwild giris
padişahbet güncel giriş
casinomilyon
biabet giris
imajbet giriş
pin up aviator
biabet giriş
sugar rush 1000