CVE-2023-25191

7.5 HIGH

📋 TL;DR

AMI MegaRAC SPX devices allow password disclosure through Redfish interfaces, enabling attackers to retrieve credentials. This affects organizations using vulnerable AMI MegaRAC SPX devices with Redfish enabled. The vulnerability allows unauthorized access to sensitive authentication information.

💻 Affected Systems

Products:
  • AMI MegaRAC SPX devices
Versions: All versions before SPx_12-update-7.00 and SPx_13-update-5.00
Operating Systems: Not OS-specific - affects BMC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Redfish interface to be enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise through credential theft leading to administrative access, data exfiltration, and potential ransomware deployment.

🟠

Likely Case

Unauthorized access to management interfaces, privilege escalation, and lateral movement within the infrastructure.

🟢

If Mitigated

Limited impact if strong network segmentation and access controls prevent Redfish interface exposure.

🌐 Internet-Facing: HIGH - Redfish interfaces exposed to internet could allow remote credential harvesting without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this to gain privileged access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires access to Redfish interface but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SPx_12-update-7.00 or SPx_13-update-5.00

Vendor Advisory: https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/AMI-SA-2023002.pdf

Restart Required: Yes

Instructions:

1. Download firmware update from AMI support portal. 2. Apply update through BMC management interface. 3. Reboot the system to activate new firmware.

🔧 Temporary Workarounds

Disable Redfish Interface

all

Temporarily disable Redfish interface to prevent exploitation

ipmitool raw 0x30 0x70 0x0c 0x00 0x00

Restrict Network Access

linux

Implement firewall rules to restrict access to Redfish ports (typically 443, 623)

iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate BMC/Redfish interfaces
  • Enable multi-factor authentication and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Test Redfish interface for password disclosure by accessing /redfish/v1/AccountService/Accounts endpoint without authentication

Check Version:

ipmitool mc info | grep 'Firmware Revision'

Verify Fix Applied:

Verify firmware version is SPx_12-update-7.00 or higher (for SPx_12) or SPx_13-update-5.00 or higher (for SPx_13)

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to Redfish endpoints
  • Multiple failed authentication attempts followed by successful access

Network Indicators:

  • Unusual traffic to Redfish ports from untrusted sources
  • Credential harvesting patterns in network traffic

SIEM Query:

source="BMC_logs" AND (uri="/redfish/v1/AccountService/Accounts" OR event="authentication_failure")

🔗 References

📤 Share & Export