search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Multiple Dell iDRAC IPMI v1.5 implementations use insufficiently random session ID values

Vulnerability Note VU#843044

Original Release Date: 2014-12-18 | Last Revised: 2014-12-18

Overview

The Intelligent Platform Management Interface (IPMI) v1.5 implementations in multiple Dell iDRAC releases are vulnerable to arbitrary command injection due to use of insufficiently random session ID values.

Description

CWE-330: Use of Insufficiently Random Values - CVE-2014-8272

The IPMI v1.5 implementations in multiple Dell iDRAC releases, including versions of iDRAC6 modular/monolithic and iDRAC7, are vulnerable to arbitrary command injection due to use of predictable and limited session ID values. Session IDs are assigned incrementally rather than randomly, enabling an authenticated user to predict subsequent session IDs based on his own session. However, due to the small pool of possible session ID values, brute force guessing attacks are viable and authentication is not necessary.

Dell has issued the following statement:

The legacy nature of the IPMI 1.5 protocol exposes several weaknesses in the overall design and implementation. These are:

      • Use of an insecure (unencrypted) channel for communication.
      • Poor password management including limited password length.
      • Limited session management capability.
These weaknesses are inherent in the overall design and implementation of the protocol, therefore support for the IPMI 1.5 version of the protocol has been permanently removed. This means that it will not be possible to reactivate or enable it in an operational setting.

Dell's full statement can be viewed in Vendor Information below.

Impact

A remote, unauthenticated attacker can inject arbitrary commands into a privileged session.

Solution

Apply an update

Dell has released the following updates that completely remove IPMI v1.5 code:


Note that removing IPMI v1.5 is a violation of the IPMI v2.0 specification, section 13.4, which requires backwards compatibility with IPMI v1.5. Other than requiring users to adopt IPMI v2.0 at the exclusion of the insecure IPMI v1.5, no additional impact of the violation is known.

Restrict access

As a general good security practice, only allow connections from trusted hosts and networks.

Dell advises the following:

DRAC’s are intended to be on a separate management network; they are not designed nor intended to be placed on or connected to the internet. Doing so could expose the connected system to security and other risks for which Dell is not responsible.
Along with locating DRACs on a separate management subnet, users should isolate the management subnet/vLAN with technologies such as firewalls, and limit access to the subnet/vLAN to authorized server administrators.

Vendor Information

The following versions of Dell iDRAC are affected: iDRAC6 modular, versions 3.60 and below; iDRAC6 monolithic, versions 1.97 and below; iDRAC7, versions 1.56.55 and below.

843044
 
Affected   Unknown   Unaffected

Dell Computer Corporation, Inc.

Notified:  December 01, 2014 Updated:  December 16, 2014

Statement Date:   December 09, 2014

Status

  Affected

Vendor Statement

Dell Response to VU #843044 Arbitrary Command Injection for IPMI 1.5 [05 December 2014]

Summary

Due to the vulnerabilities inherent in IPMI 1.5, Dell has removed IPMI 1.5 code completely. Dell recommends upgrading to the following firmware release or greater to eliminate all such vulnerabilities related to the IPMI 1.5 protocol:

      • iDRAC6 modular – version 3.65
      • iDRAC6 monolithic - version 1.98
      • iDRAC7 – version 1.57.57
      • iDRAC8 – N/A - IPMI 1.5 not present in iDRAC8 firmware

The legacy nature of the IPMI 1.5 protocol exposes several weaknesses in the overall design and implementation. These are:
      • Use of an insecure (unencrypted) channel for communication.
      • Poor password management including limited password length.
      • Limited session management capability.

These weaknesses are inherent in the overall design and implementation of the protocol, therefore support for the IPMI 1.5 version of the protocol has been permanently removed. This means that it will not be possible to reactivate or enable it in an operational setting.

Dell Best Practices

Dell advises the following:

DRAC’s are intended to be on a separate management network; they are not designed nor intended to be placed on or connected to the internet. Doing so could expose the connected system to security and other risks for which Dell is not responsible.
Along with locating DRACs on a separate management subnet, users should isolate the management subnet/vLAN with technologies such as firewalls, and limit access to the subnet/vLAN to authorized server administrators.

Dell would like to thank Mr. Yong Chuan Koh for reporting this vulnerability by following responsible disclosure process and we appreciate his patience and cooperation through the period he interacted with Dell on discussions related to this vulnerability.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.


CVSS Metrics

Group Score Vector
Base 10.0 AV:N/AC:L/Au:N/C:C/I:C/A:C
Temporal 7.8 E:POC/RL:OF/RC:C
Environmental 6.4 CDP:LM/TD:M/CR:H/IR:H/AR:H

References

Credit

Thanks to Yong Chuan Koh for reporting this vulnerability from his time with IBM X-Force Research.

This document was written by Joel Land.

Other Information

CVE IDs: CVE-2014-8272
Date Public: 2014-12-18
Date First Published: 2014-12-18
Date Last Updated: 2014-12-18 15:44 UTC
Document Revision: 28

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.