CVE-2021-0070

8.8 HIGH

📋 TL;DR

This vulnerability allows an unauthenticated attacker with adjacent network access to exploit improper input validation in the BMC firmware of Intel Server Board M10JNP2SB, potentially enabling privilege escalation. It affects servers running BMC firmware versions before 8100.01.08 and EFI BIOS before 7215. Attackers must be on the same local network segment as the vulnerable server.

💻 Affected Systems

Products:
  • Intel Server Board M10JNP2SB
Versions: BMC firmware versions before 8100.01.08 and EFI BIOS before 7215
Operating Systems: Any OS running on affected hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the specific Intel server board model. Requires adjacent network access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control over the server's baseboard management controller, allowing them to modify firmware, install persistent malware, or completely compromise the physical server hardware.

🟠

Likely Case

An attacker with internal network access gains BMC administrative privileges, enabling them to reboot servers, modify boot settings, or access console output without proper authentication.

🟢

If Mitigated

With proper network segmentation and access controls, the attack surface is limited to authorized administrative networks only, significantly reducing the risk of exploitation.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: HIGH with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires adjacent network access and knowledge of BMC network interfaces. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: BMC firmware 8100.01.08 and EFI BIOS 7215

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00474.html

Restart Required: Yes

Instructions:

1. Download the updated firmware from Intel's support site. 2. Follow Intel's firmware update procedures for the M10JNP2SB server board. 3. Apply both BMC firmware update to 8100.01.08 and EFI BIOS update to 7215. 4. Reboot the server after firmware updates.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate BMC management interfaces to a dedicated, restricted network segment accessible only to authorized administrators.

Access Control Lists

all

Implement network ACLs to restrict access to BMC management ports (typically 623/udp for IPMI) to authorized IP addresses only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate BMC interfaces from general network traffic
  • Monitor BMC network traffic for unauthorized access attempts and implement intrusion detection

🔍 How to Verify

Check if Vulnerable:

Check BMC firmware version via IPMI tools: ipmitool mc info | grep 'Firmware Revision' and compare to 8100.01.08. Check BIOS version via system BIOS or OS utilities.

Check Version:

ipmitool mc info | grep 'Firmware Revision' for BMC; dmidecode -t bios for BIOS version on Linux

Verify Fix Applied:

Verify BMC firmware version is 8100.01.08 or higher and EFI BIOS version is 7215 or higher using the same commands.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts to BMC interface
  • Unexpected BMC configuration changes
  • BMC firmware modification events

Network Indicators:

  • Unauthorized IP addresses accessing port 623/udp (IPMI)
  • Unusual BMC protocol traffic patterns

SIEM Query:

source_ip NOT IN (authorized_admin_ips) AND dest_port=623 AND protocol=UDP

🔗 References

📤 Share & Export