TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Supermicro server BMCs left exposed to remote attack by any USB device

51 pointsby GiulioSover 5 years ago

5 comments

Deimorzover 5 years ago
Blogspam of <a href="https:&#x2F;&#x2F;eclypsium.com&#x2F;2019&#x2F;09&#x2F;03&#x2F;usbanywhere-bmc-vulnerability-opens-servers-to-remote-attack&#x2F;" rel="nofollow">https:&#x2F;&#x2F;eclypsium.com&#x2F;2019&#x2F;09&#x2F;03&#x2F;usbanywhere-bmc-vulnerabili...</a> (and submitter does nothing but spam links to secalerts.co)
评论 #20873237 未加载
tedivmover 5 years ago
BMC&#x27;s (or the equivalent for whatever vendor you are using) should never be exposed to the internet- they shouldn&#x27;t even be on the same network as the rest of the server. Generally speaking I put them on a completely separate network that has to be VPN&#x27;d into explicitly. Having BMC access is as close to having physical access as you can get without actually touching the machine.
评论 #20872084 未加载
评论 #20871390 未加载
评论 #20871433 未加载
评论 #20871764 未加载
HeWhoLurksLateover 5 years ago
Is anyone getting flashbacks to <i>&quot;The Big Hack&quot;?</i><p>It feels like maybe Bloomberg knew of <i>something</i> but got the wrong root cause- it seems a lot more likely for someone to sneak in a slightly-reprogrammed BMC than change board layouts &#x2F;etc., especially considering just how much <i>control</i> BMC&#x27;s have.<p>Yikes.
评论 #20871857 未加载
评论 #20871902 未加载
altmindover 5 years ago
If these security reports are valid, this may affect not only Supermicro, but other vendors too. From the top of my head, Asus and Gigabyte workstation motherboards also carried AST2400 based BMCs, and theirs ipmi web interface looked very similar(if not totally the same) to supermicro&#x27;s.
wilhilover 5 years ago
BMCs are scary as hell... even for people who say they isolate them, you also need to do a full audit as many come with rubbish default settings.<p>For example, Dell&#x27;s default config on BMC&#x2F;Idrac (at least 4-5 years ago when I tested) do not have brute force prevention and by default utilising a special CLI program, you can logon to a DRAC from the host OS.<p>Therefore, if a host got compromised, even if Idrac is on a different network, you could in theory bruteforce from the host credentials and jump&#x2F;attack the management network.<p>FYI, for Dell, the command to disable this behaviour was racadm config -g cfgRacTune -o cfgRacTuneLocalConfigDisable 1<p>and it took quite a while to figure this out...
评论 #20872322 未加载