CVE-2023-22442
📋 TL;DR
An out-of-bounds write vulnerability in Intel Server Board BMC firmware allows privileged users with local access to escalate privileges. This affects servers with vulnerable Intel BMC firmware versions. Attackers could gain higher-level access to the baseboard management controller.
💻 Affected Systems
- Intel Server Board BMC firmware
📦 What is this software?
Server System D50tnp1mhcpac Firmware by Intel
View all CVEs affecting Server System D50tnp1mhcpac Firmware →
Server System D50tnp1mhcrac Firmware by Intel
View all CVEs affecting Server System D50tnp1mhcrac Firmware →
Server System D50tnp1mhcrlc Firmware by Intel
View all CVEs affecting Server System D50tnp1mhcrlc Firmware →
Server System D50tnp2mfalac Firmware by Intel
View all CVEs affecting Server System D50tnp2mfalac Firmware →
Server System D50tnp2mhstac Firmware by Intel
View all CVEs affecting Server System D50tnp2mhstac Firmware →
Server System D50tnp2mhsvac Firmware by Intel
View all CVEs affecting Server System D50tnp2mhsvac Firmware →
Server System M50cyp1ur204 Firmware by Intel
View all CVEs affecting Server System M50cyp1ur204 Firmware →
Server System M50cyp1ur212 Firmware by Intel
View all CVEs affecting Server System M50cyp1ur212 Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the BMC, allowing attackers to control server hardware, install persistent malware, or disrupt operations.
Likely Case
Privileged user gains administrative control over BMC, enabling unauthorized configuration changes or monitoring.
If Mitigated
Limited impact with proper access controls and network segmentation in place.
🎯 Exploit Status
Requires privileged user access and knowledge of the vulnerability. No public exploit code available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 2.90 or later
Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html
Restart Required: Yes
Instructions:
1. Download BMC firmware update from Intel support site. 2. Follow Intel's BMC firmware update procedure for your specific server model. 3. Apply the update through BMC web interface or management tools. 4. Reboot the BMC controller.
🔧 Temporary Workarounds
Restrict BMC Access
allLimit access to BMC interfaces to only authorized administrators
Network Segmentation
allIsolate BMC management network from general user networks
🧯 If You Can't Patch
- Implement strict access controls to BMC interfaces
- Monitor BMC access logs for suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check BMC firmware version through web interface or IPMI tools. Vulnerable if version < 2.90.
Check Version:
ipmitool mc info | grep 'Firmware Revision' or check BMC web interface
Verify Fix Applied:
Confirm BMC firmware version is 2.90 or higher after update.
📡 Detection & Monitoring
Log Indicators:
- Unusual BMC configuration changes
- Multiple failed login attempts to BMC
- Privilege escalation attempts in BMC logs
Network Indicators:
- Unusual traffic to BMC management ports
- Multiple connection attempts to BMC interface
SIEM Query:
source="BMC_logs" AND (event_type="privilege_escalation" OR event_type="configuration_change")