CVE-2023-50272

7.5 HIGH

📋 TL;DR

This CVE describes an authentication bypass vulnerability in HPE iLO 5 and iLO 6 remote management controllers. Attackers could potentially gain unauthorized access to iLO interfaces without valid credentials. Organizations using affected HPE servers with iLO 5 or iLO 6 are vulnerable.

💻 Affected Systems

Products:
  • HPE Integrated Lights-Out 5 (iLO 5)
  • HPE Integrated Lights-Out 6 (iLO 6)
Versions: All versions prior to patched releases
Operating Systems: Not applicable - firmware vulnerability
Default Config Vulnerable: ⚠️ Yes
Notes: Affects HPE ProLiant servers and other HPE server platforms with iLO 5/6 management controllers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of server management interface leading to full administrative control over physical servers, including power cycling, firmware modification, and OS-level access.

🟠

Likely Case

Unauthorized access to iLO management interface allowing configuration changes, monitoring data extraction, and potential foothold for further attacks.

🟢

If Mitigated

Limited impact if iLO interfaces are properly segmented and access-controlled, with attackers unable to reach vulnerable interfaces.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Vulnerability allows authentication bypass, suggesting relatively straightforward exploitation once details are known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check HPE advisory for specific firmware versions

Vendor Advisory: https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04584en_us

Restart Required: Yes

Instructions:

1. Download latest iLO firmware from HPE Support Portal. 2. Upload firmware via iLO web interface or HPE OneView. 3. Apply firmware update. 4. Reboot server to complete installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate iLO management interfaces from untrusted networks

Access Control Lists

all

Implement strict network ACLs to limit iLO access to authorized management stations only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate iLO interfaces
  • Enable multi-factor authentication and strong access controls for iLO management

🔍 How to Verify

Check if Vulnerable:

Check iLO firmware version via web interface (System Information > Firmware) or SSH (show /map1/firmware1)

Check Version:

ssh <iLO_IP> 'show /map1/firmware1'

Verify Fix Applied:

Verify firmware version matches or exceeds patched version listed in HPE advisory

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access
  • Unusual iLO login patterns
  • Configuration changes from unexpected sources

Network Indicators:

  • Unauthorized access attempts to iLO management ports (typically 17990, 443)
  • Traffic to iLO interfaces from unexpected source IPs

SIEM Query:

source="iLO_logs" AND (event_type="authentication" AND result="success" AND user="unknown")

🔗 References

📤 Share & Export