HP iLO4 authentication bypass: curl -H "Connection: AAAAAAAAAAAAAAAAAAAAAAAAAAAAA" No, that's not a crash PoC. That's a full blown auth bypass. sscanf into fixed buffer overwrites a flag field that bypasses auth. Yes, really. https://airbus-seclab.github.io/ilo/SSTIC2018-Slides-EN-Backdooring_your_server_through_its_BMC_the_HPE_iLO4_case-perigaud-gazet-czarny.pdf …
-
-
Hm. With the System BIOS it said the same too (Entitlement required). But could d/l it anyway... But it's true: The iLO4 2.60 was free for Gen8.pic.twitter.com/q5dCyxz301
-
Yeah, iLO firmware is still free (and server independent; there is only one iLO4, it doesn't matter what server you have, the firmware is the same), but the BIOS updates are not.
- Show replies
New conversation -
-
-
so gen8 is not affected? have 2.55 on 2 gen 8 servers
-
Since "2.55" came out before the vuln was send to HP, I gues you're better of to install 2.60! But there was a changelog near the download link too...
End of conversation
New conversation -
-
-
So you don't buy Cisco network gear then either right? Because they have been doing this for decades.
-
Indeed, I don't. I actually used to like HP switches (Procurve is still good value surplus/2nd hand), but their latest stuff is a mess. I tried Juniper, Huawei, Dell and went with Dell (Force10) recently. They actually support multiple OSes and are x86 based.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.