CVE-2023-29057

7.3 HIGH

📋 TL;DR

This vulnerability allows authenticated users to bypass intended Active Directory permission restrictions when specific LDAP configuration is used. It affects Lenovo XClarity Controller (XCC) systems configured with 'Local First, then LDAP' authentication mode. Attackers with valid local credentials could gain elevated privileges beyond what their AD permissions should allow.

💻 Affected Systems

Products:
  • Lenovo XClarity Controller (XCC)
Versions: All versions prior to 2.10.0
Operating Systems: Not OS dependent - firmware vulnerability
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when LDAP is configured for authentication/authorization AND login method is set to 'Local First, then LDAP'

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privilege escalation to administrative control of XCC management interface, potentially leading to full compromise of managed server hardware and ability to modify firmware/bios settings.

🟠

Likely Case

Authenticated users gaining unauthorized access to management functions beyond their intended role, potentially modifying system configurations or accessing sensitive hardware information.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though privilege escalation risk remains for authenticated users.

🌐 Internet-Facing: MEDIUM - XCC interfaces exposed to internet could be targeted, but attacker needs valid credentials and specific configuration.
🏢 Internal Only: HIGH - Internal attackers with local credentials can exploit this to bypass AD permission controls and escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid local user credentials and specific LDAP configuration. No public exploit code available as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: XCC firmware version 2.10.0 or later

Vendor Advisory: https://support.lenovo.com/us/en/product_security/LEN-118321

Restart Required: Yes

Instructions:

1. Download XCC firmware version 2.10.0 or later from Lenovo Support. 2. Log into XCC web interface. 3. Navigate to Maintenance > Firmware Update. 4. Upload and apply the firmware update. 5. Reboot the XCC controller when prompted.

🔧 Temporary Workarounds

Change Authentication Method

all

Switch from 'Local First, then LDAP' to 'LDAP Only' authentication mode

XCC web interface: Configuration > Users > Authentication > Change method to 'LDAP Only'

Disable Local Accounts

all

Remove or disable local user accounts to force all authentication through LDAP

XCC web interface: Configuration > Users > Local Users > Disable or delete local accounts

🧯 If You Can't Patch

  • Change authentication method to 'LDAP Only' instead of 'Local First, then LDAP'
  • Implement strict network segmentation to limit XCC interface access to authorized administrators only
  • Monitor XCC authentication logs for unusual local account activity
  • Review and minimize local user accounts with administrative privileges

🔍 How to Verify

Check if Vulnerable:

1. Log into XCC web interface. 2. Check firmware version under Maintenance > Firmware Information. 3. Verify if version is below 2.10.0. 4. Check authentication method under Configuration > Users > Authentication.

Check Version:

From XCC web interface: Maintenance > Firmware Information shows current version

Verify Fix Applied:

1. Confirm firmware version is 2.10.0 or higher. 2. Verify authentication method is NOT set to 'Local First, then LDAP'. 3. Test user permissions to ensure AD restrictions are properly enforced.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed LDAP authentication attempts followed by successful local authentication
  • User accessing functions beyond their AD-assigned role
  • Authentication method changes in configuration logs

Network Indicators:

  • Unusual XCC management interface access patterns
  • Authentication traffic showing local login when LDAP should be primary

SIEM Query:

source="xcc" AND (event_type="authentication" AND auth_method="local" AND config_auth="local_first_ldap")

🔗 References

📤 Share & Export