CVE-2024-46933

7.7 HIGH

📋 TL;DR

BullSequana XH2140 BMC systems were shipped with unconfigured AST2600 hardware, allowing privileged attackers to cause denial-of-service conditions. This affects BullSequana XH2140 systems with BMC firmware before C4EM-125: OMF_C4E 101.05.0014. The vulnerability stems from improper hardware programming during manufacturing.

💻 Affected Systems

Products:
  • Atos Eviden BullSequana XH2140
Versions: BMC firmware before C4EM-125: OMF_C4E 101.05.0014
Operating Systems: Not OS-dependent - BMC firmware vulnerability
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems shipped with unconfigured AST2600 hardware. Vulnerability exists at hardware/firmware level, not dependent on OS configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged attacker causes complete BMC failure, rendering the server unmanageable and potentially requiring physical intervention to restore functionality.

🟠

Likely Case

Authorized administrators or compromised privileged accounts could disrupt BMC operations, affecting remote management capabilities.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to authorized users who would need to intentionally exploit the vulnerability.

🌐 Internet-Facing: LOW - BMC interfaces should not be internet-facing in proper configurations.
🏢 Internal Only: MEDIUM - Requires privileged access but could be exploited by compromised internal accounts or malicious insiders.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires privileged access to BMC interface. No public exploit code available as of current information.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: C4EM-125: OMF_C4E 101.05.0014 or later

Vendor Advisory: https://support.bull.com/ols/product/security/psirt/security-bulletins/ast2600-left-unconfigured-in-bullsequana-xh2140-psirt-270-tlp-clear-version-2-7-cve-2024-46933/view

Restart Required: No

Instructions:

1. Download BMC firmware update from Bull support portal. 2. Apply update through BMC web interface or CLI. 3. Verify firmware version after update.

🔧 Temporary Workarounds

Restrict BMC Access

all

Limit BMC interface access to only authorized administrators using network segmentation and strict access controls.

🧯 If You Can't Patch

  • Isolate BMC management network from general corporate network
  • Implement strict access controls and monitoring for BMC interfaces

🔍 How to Verify

Check if Vulnerable:

Check BMC firmware version via BMC web interface or IPMI commands. If version is earlier than C4EM-125: OMF_C4E 101.05.0014, system is vulnerable.

Check Version:

ipmitool mc info | grep 'Firmware Revision' or check via BMC web interface under firmware information

Verify Fix Applied:

Verify BMC firmware version shows C4EM-125: OMF_C4E 101.05.0014 or later after applying update.

📡 Detection & Monitoring

Log Indicators:

  • BMC firmware version changes
  • BMC service disruptions or restarts
  • Failed BMC authentication attempts from privileged accounts

Network Indicators:

  • Unusual BMC network traffic patterns
  • BMC interface becoming unresponsive

SIEM Query:

source="BMC" AND (event_type="firmware_update" OR event_type="service_disruption")

🔗 References

📤 Share & Export