CVE-2024-35124

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to gain administrative access to OpenBMC systems by exploiting default passwords and session management weaknesses. It affects IBM systems running specific OpenBMC firmware versions. Attackers can take full control of the Baseboard Management Controller, which manages hardware monitoring and remote administration.

💻 Affected Systems

Products:
  • IBM systems with OpenBMC firmware
Versions: FW1050.00 through FW1050.10, FW1030.00 through FW1030.50, FW1020.00 through FW1020.60
Operating Systems: OpenBMC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configurations with unchanged default passwords.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of BMC allowing attackers to install persistent malware, manipulate hardware settings, intercept traffic, and maintain access even after system reboots.

🟠

Likely Case

Unauthorized administrative access to BMC leading to system monitoring, configuration changes, and potential lateral movement to connected systems.

🟢

If Mitigated

Limited impact if default passwords were changed and proper network segmentation was implemented.

🌐 Internet-Facing: HIGH if BMC interfaces are exposed to the internet, as attackers can directly exploit default credentials.
🏢 Internal Only: MEDIUM as attackers still need network access, but default credentials make exploitation straightforward once access is gained.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires knowledge of default credentials and network access to BMC interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions beyond affected ranges (FW1050.11+, FW1030.51+, FW1020.61+)

Vendor Advisory: https://www.ibm.com/support/pages/node/7163195

Restart Required: Yes

Instructions:

1. Download updated firmware from IBM support portal. 2. Backup current BMC configuration. 3. Apply firmware update via BMC web interface or IPMI. 4. Reboot BMC. 5. Verify new firmware version.

🔧 Temporary Workarounds

Change Default Passwords

all

Immediately change all default BMC passwords to strong, unique credentials.

ipmitool user set password <userid> <newpassword>

Network Segmentation

linux

Restrict BMC network access to management VLANs only.

iptables -A INPUT -s <management_network> -p tcp --dport 443 -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Change all default passwords immediately and enforce strong password policies
  • Implement strict network access controls to isolate BMC interfaces from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check BMC firmware version via web interface or 'ipmitool mc info' command and compare against affected versions.

Check Version:

ipmitool mc info | grep 'Firmware Revision'

Verify Fix Applied:

Verify firmware version is beyond affected ranges and test that default credentials no longer work.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login with default credentials
  • Unusual BMC configuration changes from unexpected sources

Network Indicators:

  • BMC authentication attempts from unauthorized IP addresses
  • BMC traffic outside management network segments

SIEM Query:

source="bmc" AND (event_type="authentication" AND result="success" AND user="admin") OR (event_type="configuration_change" AND user!="authorized_user")

🔗 References

📤 Share & Export