CVE-2024-45656

9.8 CRITICAL

📋 TL;DR

IBM Flexible Service Processor (FSP) firmware contains hardcoded credentials that could allow network users to gain service privileges. This affects multiple FSP firmware versions across various IBM server platforms. Attackers with network access could exploit these static credentials to compromise the service processor.

💻 Affected Systems

Products:
  • IBM Flexible Service Processor (FSP)
Versions: FW860.00 through FW860.B3, FW950.00 through FW950.C0, FW1030.00 through FW1030.61, FW1050.00 through FW1050.21, FW1060.00 through FW1060.10
Operating Systems: FSP firmware - not OS dependent
Default Config Vulnerable: ⚠️ Yes
Notes: Affects IBM Power Systems servers using vulnerable FSP firmware versions. The FSP is a separate management processor from the main server OS.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of the service processor allowing attackers to gain administrative control over the FSP, potentially leading to server management takeover, data exfiltration, or denial of service.

🟠

Likely Case

Unauthorized access to the FSP management interface enabling configuration changes, monitoring data access, and potential privilege escalation to the host system.

🟢

If Mitigated

Limited impact if network segmentation isolates FSP interfaces and strong access controls are implemented, though the vulnerability remains present.

🌐 Internet-Facing: HIGH - If FSP interfaces are exposed to the internet, attackers can easily exploit the static credentials.
🏢 Internal Only: HIGH - Even internally, any network user could potentially access the FSP with the known credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only network access to the FSP interface and knowledge of the static credentials. No authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply firmware updates: FW860.B4 or later, FW950.C1 or later, FW1030.62 or later, FW1050.22 or later, FW1060.11 or later

Vendor Advisory: https://www.ibm.com/support/pages/node/7174183

Restart Required: Yes

Instructions:

1. Download appropriate firmware update from IBM Fix Central. 2. Apply update through FSP web interface or HMC. 3. Reboot the service processor. 4. Verify firmware version after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate FSP management interfaces from general network access

Access Control Lists

all

Implement strict network ACLs to limit access to FSP interfaces

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate FSP interfaces from untrusted networks
  • Monitor FSP access logs for unauthorized authentication attempts and credential use

🔍 How to Verify

Check if Vulnerable:

Check FSP firmware version through HMC or FSP web interface and compare against affected versions list

Check Version:

From HMC: lssyscfg -r sys -F state,type_model,serial_num,ipaddr

Verify Fix Applied:

Verify firmware version is updated to patched version through FSP interface

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful logins
  • Multiple login attempts from unusual sources
  • Configuration changes from unexpected users

Network Indicators:

  • Network traffic to FSP management ports from unauthorized sources
  • Authentication attempts using default/service credentials

SIEM Query:

source="fsp_logs" AND (event_type="authentication" AND result="success") AND user="service_account"

🔗 References

📤 Share & Export