HP iLO4 authentication bypass: curl -H "Connection: AAAAAAAAAAAAAAAAAAAAAAAAAAAAA" No, that's not a crash PoC. That's a full blown auth bypass. sscanf into fixed buffer overwrites a flag field that bypasses auth. Yes, really. https://airbus-seclab.github.io/ilo/SSTIC2018-Slides-EN-Backdooring_your_server_through_its_BMC_the_HPE_iLO4_case-perigaud-gazet-czarny.pdf …
-
-
Ok cool, I didn't miss anything. Twitter is far far too terse to convey all the nuance. Thx.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
TL;DR: isolating BMCs on a dedicated LAN isn't enough: attackers can compromise a host, then its BMC, then other BMCs on the LAN, then other hosts. You absolutely want them on a private VLAN or on separate L2 segments with a firewall.
-
And a bmc should be isolated. If a bmc can see other bmc, they can spread the fun
- Show replies
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.