The Intelligent Platform Management Interface (IPMI) v1.5 implementations in multiple Dell iDRAC releases are vulnerable to arbitrary command injection due to use of insufficiently random session ID values.
CWE-330: Use of Insufficiently Random Values - CVE-2014-8272
The IPMI v1.5 implementations in multiple Dell iDRAC releases, including versions of iDRAC6 modular/monolithic and iDRAC7, are vulnerable to arbitrary command injection due to use of predictable and limited session ID values. Session IDs are assigned incrementally rather than randomly, enabling an authenticated user to predict subsequent session IDs based on his own session. However, due to the small pool of possible session ID values, brute force guessing attacks are viable and authentication is not necessary.
Dell's full statement can be viewed in Vendor Information below.
A remote, unauthenticated attacker can inject arbitrary commands into a privileged session.
Apply an update
Note that removing IPMI v1.5 is a violation of the IPMI v2.0 specification, section 13.4, which requires backwards compatibility with IPMI v1.5. Other than requiring users to adopt IPMI v2.0 at the exclusion of the insecure IPMI v1.5, no additional impact of the violation is known.
As a general good security practice, only allow connections from trusted hosts and networks.
Dell advises the following:
DRAC’s are intended to be on a separate management network; they are not designed nor intended to be placed on or connected to the internet. Doing so could expose the connected system to security and other risks for which Dell is not responsible.
Along with locating DRACs on a separate management subnet, users should isolate the management subnet/vLAN with technologies such as firewalls, and limit access to the subnet/vLAN to authorized server administrators.
The following versions of Dell iDRAC are affected: iDRAC6 modular, versions 3.60 and below; iDRAC6 monolithic, versions 1.97 and below; iDRAC7, versions 1.56.55 and below.
Thanks to Yong Chuan Koh for reporting this vulnerability from his time with IBM X-Force Research.
This document was written by Joel Land.
|Date First Published:
|Date Last Updated:
|2014-12-18 15:44 UTC