CVE-2023-35123
📋 TL;DR
An uncaught exception vulnerability in OpenBMC firmware for certain Intel server platforms allows authenticated users to cause denial of service via network access. This affects Intel server platforms running vulnerable OpenBMC firmware versions before egs-1.14-0 and bhs-0.27.
💻 Affected Systems
- Intel Server Platforms with OpenBMC firmware
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete server management interface outage requiring physical intervention to restore functionality.
Likely Case
Temporary disruption of BMC management functions while system reboots or recovers automatically.
If Mitigated
Minimal impact with proper network segmentation and authentication controls limiting access to authorized administrators only.
🎯 Exploit Status
Requires authenticated access to the BMC interface. The vulnerability is triggered by an uncaught exception, suggesting relatively straightforward exploitation once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: egs-1.14-0 or bhs-0.27 and later
Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01078.html
Restart Required: Yes
Instructions:
1. Download updated OpenBMC firmware from Intel support portal. 2. Access BMC web interface or use IPMI tools. 3. Upload and apply firmware update. 4. Reboot the BMC controller to complete installation.
🔧 Temporary Workarounds
Restrict BMC Network Access
linuxLimit access to BMC interfaces to only authorized management networks and administrators.
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP
Strengthen Authentication
allEnforce strong passwords and consider multi-factor authentication for BMC access.
🧯 If You Can't Patch
- Isolate BMC interfaces on dedicated management VLANs with strict firewall rules
- Implement network monitoring for unusual BMC access patterns and implement rate limiting
🔍 How to Verify
Check if Vulnerable:
Check OpenBMC firmware version via BMC web interface or using IPMI command: ipmitool mc info | grep 'Firmware Revision'
Check Version:
ipmitool mc info | grep 'Firmware Revision'
Verify Fix Applied:
Confirm firmware version shows egs-1.14-0 or bhs-0.27 or higher after update
📡 Detection & Monitoring
Log Indicators:
- BMC crash logs
- Unexpected BMC restarts
- Authentication failures followed by service disruption
Network Indicators:
- Multiple authentication attempts to BMC interface followed by service unavailability
SIEM Query:
source="BMC" AND (event_type="crash" OR event_type="restart") AND NOT user="authorized_admin"