CVE-2024-3411
📋 TL;DR
This vulnerability allows attackers to hijack IPMI authenticated sessions by exploiting insufficient randomness in session IDs or BMC random numbers. Attackers can spoof IPMI packets to bypass authentication and gain unauthorized management access to BMC devices. This affects systems using vulnerable IPMI implementations, particularly Dell iDRAC8 and other BMC implementations.
💻 Affected Systems
- Dell iDRAC8
- Other IPMI 2.0 implementations with vulnerable session management
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of BMC management interface allowing attacker to execute arbitrary commands, modify firmware, disable hardware, or establish persistent backdoor access to the server hardware.
Likely Case
Unauthorized access to BMC management functions allowing attacker to reboot systems, modify hardware settings, or gain foothold for further network exploitation.
If Mitigated
Limited impact if IPMI interfaces are properly isolated, but still potential for management plane compromise if exploited.
🎯 Exploit Status
Exploitation requires network access to IPMI interface but does not require authentication once the vulnerability is understood.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Dell iDRAC8: 2.90.90.90 or later (check specific vendor for other implementations)
Vendor Advisory: https://www.dell.com/support/kbdoc/en-US/000226504/dsa-2024-295-security-update-for-dell-idrac8-ipmi-session-vulnerability
Restart Required: Yes
Instructions:
1. Check current iDRAC8 firmware version. 2. Download latest firmware from Dell support site. 3. Apply firmware update through iDRAC web interface or using racadm commands. 4. Reboot the iDRAC/BMC after update.
🔧 Temporary Workarounds
Network Isolation
allIsolate IPMI/BMC management interfaces from untrusted networks
Configure firewall rules to restrict IPMI access to management VLAN only
Use network ACLs to limit source IP addresses
Disable IPMI if not needed
allCompletely disable IPMI interface if not required for management
racadm config -g cfgIpmiLan -o cfgIpmiLanEnable 0 (for Dell)
Check vendor documentation for disabling IPMI
🧯 If You Can't Patch
- Implement strict network segmentation to isolate IPMI interfaces from all untrusted networks
- Enable IPMI authentication and use strong, unique credentials (though this doesn't fix the vulnerability, it adds defense in depth)
🔍 How to Verify
Check if Vulnerable:
Check iDRAC8 firmware version: racadm getversion or via web interface. Versions prior to 2.90.90.90 are vulnerable.
Check Version:
racadm getversion (for Dell iDRAC8)
Verify Fix Applied:
Verify firmware version is 2.90.90.90 or later using racadm getversion command or web interface.
📡 Detection & Monitoring
Log Indicators:
- Unusual IPMI authentication patterns
- Multiple failed session attempts followed by successful authentication from different IP
- IPMI session ID collisions or anomalies
Network Indicators:
- Spoofed IPMI packets with predictable session IDs
- IPMI traffic from unexpected source IPs
- Abnormal IPMI session establishment patterns
SIEM Query:
source="ipmi" AND (event_type="session_hijack" OR auth_failure>3 AND auth_success=1)
🔗 References
- https://kb.cert.org/vuls/id/163057
- https://www.dell.com/support/kbdoc/en-US/000226504/dsa-2024-295-security-update-for-dell-idrac8-ipmi-session-vulnerability
- https://www.intel.la/content/dam/www/public/us/en/documents/specification-updates/ipmi-intelligent-platform-mgt-interface-spec-2nd-gen-v2-0-spec-update.pdf
- https://kb.cert.org/vuls/id/163057
- https://www.dell.com/support/kbdoc/en-US/000226504/dsa-2024-295-security-update-for-dell-idrac8-ipmi-session-vulnerability
- https://www.intel.la/content/dam/www/public/us/en/documents/specification-updates/ipmi-intelligent-platform-mgt-interface-spec-2nd-gen-v2-0-spec-update.pdf
- https://www.kb.cert.org/vuls/id/163057