CVE-2021-25124
📋 TL;DR
This CVE describes a local path traversal vulnerability in the Baseboard Management Controller (BMC) firmware of specific HPE Cloudline servers. An attacker with local access to the BMC can exploit this to delete arbitrary files on the system, potentially leading to denial of service or system compromise. Affected systems include HPE Cloudline CL5800 Gen9, CL5200 Gen9, CL4100 Gen10, CL3100 Gen10, and CL5800 Gen10 servers.
💻 Affected Systems
- HPE Cloudline CL5800 Gen9 Server
- HPE Cloudline CL5200 Gen9 Server
- HPE Cloudline CL4100 Gen10 Server
- HPE Cloudline CL3100 Gen10 Server
- HPE Cloudline CL5800 Gen10 Server
📦 What is this software?
Cloudline Cl3100 Gen10 Server Firmware by Hpe
View all CVEs affecting Cloudline Cl3100 Gen10 Server Firmware →
Cloudline Cl3100 Gen10 Server Firmware by Hpe
View all CVEs affecting Cloudline Cl3100 Gen10 Server Firmware →
Cloudline Cl4100 Gen10 Server Firmware by Hpe
View all CVEs affecting Cloudline Cl4100 Gen10 Server Firmware →
Cloudline Cl4100 Gen10 Server Firmware by Hpe
View all CVEs affecting Cloudline Cl4100 Gen10 Server Firmware →
Cloudline Cl5200 Gen9 Server Firmware by Hpe
View all CVEs affecting Cloudline Cl5200 Gen9 Server Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through deletion of critical system files, rendering the server inoperable or allowing privilege escalation.
Likely Case
Denial of service by deleting important BMC or system files, disrupting server management capabilities.
If Mitigated
Limited impact if proper access controls restrict local BMC access to authorized administrators only.
🎯 Exploit Status
Exploitation requires local access to the BMC interface. The path traversal vulnerability in deletevideo_func allows file deletion operations.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to BMC firmware version specified in HPE advisory HPSBHF04073
Vendor Advisory: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf04073en_us
Restart Required: Yes
Instructions:
1. Download the updated BMC firmware from HPE Support. 2. Access the BMC web interface. 3. Navigate to firmware update section. 4. Upload and apply the firmware update. 5. Reboot the BMC as required.
🔧 Temporary Workarounds
Restrict BMC Network Access
allLimit network access to BMC interfaces to authorized management networks only using firewall rules.
Implement Strong BMC Authentication
allEnsure BMC interfaces use strong, unique credentials and consider multi-factor authentication if supported.
🧯 If You Can't Patch
- Isolate BMC management interfaces on separate VLANs with strict access controls
- Implement network monitoring for unusual BMC access patterns or file deletion attempts
🔍 How to Verify
Check if Vulnerable:
Check BMC firmware version against affected versions listed in HPE advisory HPSBHF04073
Check Version:
Check via BMC web interface under System Information or use IPMI commands: ipmitool mc info
Verify Fix Applied:
Verify BMC firmware has been updated to version specified in HPE advisory and confirm version matches patched release
📡 Detection & Monitoring
Log Indicators:
- Unusual file deletion events in BMC logs
- Multiple failed authentication attempts to BMC interface
- Unexpected BMC firmware modification attempts
Network Indicators:
- Unusual traffic patterns to BMC IP addresses
- Multiple connection attempts to BMC web/API interfaces from unauthorized sources
SIEM Query:
source="bmc_logs" AND (event_type="file_deletion" OR event_type="firmware_modification")