TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Over 20k servers have their iLO interfaces exposed to the internet

178 pointsby caaqilover 3 years ago

18 comments

johnklosover 3 years ago
I reported a security issue in Supermicro&#x27;s IPMI implementation to them. They dismissed the issue and never fixed it.<p>These companies don&#x27;t care if there&#x27;s no way to stop a remote control service (iLo, iDRAC, IPMI) from binding to a motherboard ethernet port. In the case of Supermicro, you can&#x27;t configure via the built-in BIOS, there are no jumpers you can use, and you must have a full network setup and installed tools to configure a new machine. This makes deploying in the field much, much more problematic.<p>If the BIOS battery dies and settings set are lost, the motherboard defaults to joining whichever ethernet is active, with default credentials. It&#x27;s incredibly stupid and insecure.<p>I will never buy Supermicro again, but for the hardware that was already bought, I mandated loopback plugs for all IPMI ports so the IPMI wouldn&#x27;t switch to the system ethernet.
评论 #30121550 未加载
评论 #30121578 未加载
danpalmerover 3 years ago
BMCs are slightly different I think (more powerful!) but at my previous workplace we once had a server provided to us by our hosting provider that had its BMC exposed on the internet with default credentials. They never told us the machine even had one (most of our servers from them didn’t). We only figured it out once we found a Monero miner on the machine.<p>People on here love promoting dedicated servers over cloud VMs, but it’s so much easier for this sort of thing to go wrong with dedicated hosting.
评论 #30119762 未加载
评论 #30119775 未加载
评论 #30119678 未加载
评论 #30121948 未加载
评论 #30123956 未加载
GekkePrutserover 3 years ago
This is actually really much lower than I expected..<p>Though what helps is that most servers have a dedicated iLO interface and you really have to choose to configure it on the regular ones along with normal traffic. So out of band is default.<p>So in this case it&#x27;s only people who have deliberately configured this. I think this is why it&#x27;s not hundreds of thousands.
评论 #30119557 未加载
评论 #30119730 未加载
评论 #30119446 未加载
评论 #30120393 未加载
评论 #30129105 未加载
mircealover 3 years ago
if you want to be really scared read:<p><a href="http:&#x2F;&#x2F;fish2.com&#x2F;ipmi&#x2F;itrain.pdf" rel="nofollow">http:&#x2F;&#x2F;fish2.com&#x2F;ipmi&#x2F;itrain.pdf</a><p>all servers in a datacenter have this management interface (iLO is just one type).<p>if the management network these sit on is poorly secured (like here) your servers are literally powned.
评论 #30122918 未加载
twicover 3 years ago
The amount of access that BMCs have to the system seems nuts to me. How about a BMC-esque thing whose only function is to provide remote access to the host machine&#x27;s essential interfaces?<p>On one side, an ethernet port, that you plug into your management plane. On the other side, a serial port, to access the host&#x27;s console, a device-side SATA port, so it can present a virtual boot disk to the host, and a wire to the power supply, to turn the host on and off. Maybe also some read-only interface to motherboard-level monitoring like SMART and so on; maybe you get that by cooperation with the host&#x27;s firmware, over the serial or SATA interface. That would let you bring a machine up and configure it, reboot it remotely, force it to boot from a recovery disk, etc. But a hacked BMC couldn&#x27;t be used to subtly interfere with the host.<p>Also, does anyone know what Oxide are doing about BMC?
评论 #30123117 未加载
cesarefover 3 years ago
The older iLO2 and 3 were from the Gen7&#x2F;8 HP rack mount servers, which were released around 2013 or something like that. I&#x27;d have thought that the majority of commercial uses have long passed, so I was wondering if these generation of machines are really being used for home labs, that sort of thing, as they are passed their use by date (I think the gen7 machines were EOSL&#x27;d in 2018 so they&#x27;ll have been chucked out of datacentres).<p>Actually, I can imagine a fair few are still in use as small enterprise servers, with iLO being visible for remote admin, which is a shame, as that suggests they are not behind a tunnel, so those addresses probably indicate larger problems than a visible iLO.
评论 #30120723 未加载
评论 #30128888 未加载
gengelbroover 3 years ago
I&#x27;ve had the bad fortune of dealing with iLO in the past. There&#x27;s absolutely nothing surprising to me that it would be remotely exploitable, as well as default remote accessible.
znpyover 3 years ago
First things I did on my own server at home:<p>1. Disable public ipv6 on the iLO interface<p>2. change all the passwords<p>3. Set-up tls on the web interface and force http to https redirection.<p>Ironically, point 3 alone is really most of the protection: the web interface is so slow in https it&#x27;s basically unusable.
myself248over 3 years ago
Seems to me that we&#x27;d get some pretty good infosec bang-for-buck to hire some new FBI agents to just wear badges and knock on doors of businesses with such abjectly shittastic security.<p>Either their IT people have been begging to fix it and management won&#x27;t give them the resources, or they don&#x27;t have IT people who even see it as a problem. Either way, a couple special agents having a sit-down with the CEO might change some course real fast.<p>Discuss.
评论 #30123925 未加载
评论 #30137679 未加载
IYashaover 3 years ago
Sometimes people don&#x27;t have choice - it&#x27;s colocation, dc doesn&#x27;t offer management vpn&#x2F;firewalling, you can&#x27;t install separate vpn router unless you pay for another unit in a rack. And iLO&#x2F;LOM&#x2F;WTF at least offers https... what can you do? Well, some people call dc to have their LOs (un-)plugged for maintenance time.
bogwogover 3 years ago
Doesn’t HP require a support contract for firmware updates? That would probably explain why so many of those are on old firmwares.
serverCuriosover 3 years ago
That was a great deep dive in to iLO. I wonder how much of that would apply to Dell&#x27;s iDRAC?
davidzweigover 3 years ago
Is there a consensus on whether it&#x27;s ok to port forward from the firewall to port 22 (SSH) on the BMC, with a strong admin password? I guess this should be safer than exposing the web interface.
评论 #30123101 未加载
评论 #30122591 未加载
ggmover 3 years ago
I love how iDrac shipped with a password everyone knows. I would have thought it was trivial to make it a 1-time passthrough to change it, to stop this being the cartoon character we know and love.
评论 #30121922 未加载
ted_dunningover 3 years ago
As a quick note, this is 4 year old news.<p>The security group at HPE called everybody that they could identify at that time to help them fix this.
rltover 3 years ago
Sometimes I wish we could just burn it all down and start over.
MikeAshley178over 3 years ago
I looked at this sometime ago. Here is what I found.<p><a href="https:&#x2F;&#x2F;github.com&#x2F;tg12&#x2F;rapid7_OSINT" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;tg12&#x2F;rapid7_OSINT</a>
cmaover 3 years ago
Some could be honeypots
评论 #30119380 未加载