![]() |
Supermicro IPMI exploit - still vulnerable
An exploit against Supermicro IPMI that allows pulling a plain text list of users and passwords using a simple Get command to a specific port from back in November 2013 was not actually fixed in the firmware updates supplied by Supermicro, apparently.
http://arstechnica.com/security/2014...dvisory-warns/ There are a couple of more effective options for your server admins that are not being discussed: 1. Limit IPMI connections to specific IPs 2. Put IPMI behind a VPN / firewall. 3. Disable Telnet connections. I've only seen one datacenter post an advisory on this and their solution is to helpfully null route your IPMI connection IPs. :thumbsup |
Here is a detailed explanation and tips: http://blog.quadranet.com/supermicro...in-plain-text/
They are nullrouting temporarily and also filtering the effected port at their border routers to limit the effect as best as possible. Users (idiots) all over the Internet however have had their hard drives WIPED, DATA STOLEN, and more however. I know first hand people who have had multiple servers wiped (and who knows what else with the data before being wiped), all because they wanted and whined about having their IPMI on public IP addresses. The real solution is upgrading your firmware AND moving IPMI _OFF_ public access internet. Only newbs want their IPMI on public, and only newb companys dont have a VPN tunnel service to the IPMI so its fully secure. |
Quote:
|
Quote:
I just looked up the IP of addtrades.com and yeah, I agree with your thoughts on them :winkwink: I know who they are :upsidedow |
All times are GMT -7. The time now is 10:16 AM. |
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc