CVE-2023-35123

4.3 MEDIUM

📋 TL;DR

An uncaught exception vulnerability in OpenBMC firmware for certain Intel server platforms allows authenticated users to cause denial of service via network access. This affects Intel server platforms running vulnerable OpenBMC firmware versions before egs-1.14-0 and bhs-0.27.

💻 Affected Systems

Products:
  • Intel Server Platforms with OpenBMC firmware
Versions: All versions before egs-1.14-0 and bhs-0.27
Operating Systems: OpenBMC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Intel server platforms with vulnerable OpenBMC firmware versions. Requires authenticated access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server management interface outage requiring physical intervention to restore functionality.

🟠

Likely Case

Temporary disruption of BMC management functions while system reboots or recovers automatically.

🟢

If Mitigated

Minimal impact with proper network segmentation and authentication controls limiting access to authorized administrators only.

🌐 Internet-Facing: LOW - BMC interfaces should never be directly internet-facing in proper configurations.
🏢 Internal Only: MEDIUM - Requires authenticated access but could disrupt server management for authorized users.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access to the BMC interface. The vulnerability is triggered by an uncaught exception, suggesting relatively straightforward exploitation once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: egs-1.14-0 or bhs-0.27 and later

Vendor Advisory: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01078.html

Restart Required: Yes

Instructions:

1. Download updated OpenBMC firmware from Intel support portal. 2. Access BMC web interface or use IPMI tools. 3. Upload and apply firmware update. 4. Reboot the BMC controller to complete installation.

🔧 Temporary Workarounds

Restrict BMC Network Access

linux

Limit access to BMC interfaces to only authorized management networks and administrators.

iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

Strengthen Authentication

all

Enforce strong passwords and consider multi-factor authentication for BMC access.

🧯 If You Can't Patch

  • Isolate BMC interfaces on dedicated management VLANs with strict firewall rules
  • Implement network monitoring for unusual BMC access patterns and implement rate limiting

🔍 How to Verify

Check if Vulnerable:

Check OpenBMC firmware version via BMC web interface or using IPMI command: ipmitool mc info | grep 'Firmware Revision'

Check Version:

ipmitool mc info | grep 'Firmware Revision'

Verify Fix Applied:

Confirm firmware version shows egs-1.14-0 or bhs-0.27 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • BMC crash logs
  • Unexpected BMC restarts
  • Authentication failures followed by service disruption

Network Indicators:

  • Multiple authentication attempts to BMC interface followed by service unavailability

SIEM Query:

source="BMC" AND (event_type="crash" OR event_type="restart") AND NOT user="authorized_admin"

🔗 References

📤 Share & Export