CVE-2024-8059

4.3 MEDIUM

📋 TL;DR

This vulnerability exposes IPMI credentials in XCC audit logs when usernames are exactly 16 characters long. It affects Lenovo servers with XCC firmware. Attackers with access to audit logs could capture credentials for IPMI management interfaces.

💻 Affected Systems

Products:
  • Lenovo servers with XCC firmware
Versions: XCC firmware versions prior to 1.13.0
Operating Systems: Any OS managed by affected XCC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects accounts with usernames exactly 16 characters long; shorter or longer usernames are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain administrative credentials for IPMI interfaces, enabling full system compromise, firmware modification, or persistent backdoor installation.

🟠

Likely Case

Privileged users or attackers with existing log access capture credentials, potentially escalating privileges within the management infrastructure.

🟢

If Mitigated

With proper access controls and log protection, credential exposure remains contained within authorized administrative channels.

🌐 Internet-Facing: LOW - IPMI interfaces should never be internet-facing; exposure requires existing access to management infrastructure.
🏢 Internal Only: MEDIUM - Internal attackers with log access could capture credentials, but requires specific username length condition.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to XCC audit logs, which typically requires administrative or privileged access to the management interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: XCC firmware version 1.13.0 or later

Vendor Advisory: https://support.lenovo.com/us/en/product_security/LEN-172051

Restart Required: Yes

Instructions:

1. Download XCC firmware version 1.13.0 or later from Lenovo support site. 2. Log into XCC web interface. 3. Navigate to Firmware Update section. 4. Upload and apply the firmware update. 5. Reboot the server as prompted.

🔧 Temporary Workarounds

Change username length

all

Modify any IPMI account usernames to be shorter or longer than 16 characters

Use XCC web interface or IPMI tool to rename accounts: ipmitool user set name <userid> <new_username>

Restrict audit log access

all

Limit access to XCC audit logs to only necessary administrative personnel

Configure XCC user permissions to restrict log viewing capabilities

🧯 If You Can't Patch

  • Change all IPMI account usernames to not be exactly 16 characters long
  • Implement strict access controls for XCC audit logs and monitor for unauthorized access

🔍 How to Verify

Check if Vulnerable:

Check XCC firmware version via web interface or IPMI: ipmitool mc info | grep 'Firmware Revision'

Check Version:

ipmitool mc info | grep 'Firmware Revision'

Verify Fix Applied:

Verify firmware version is 1.13.0 or later and check that no accounts have 16-character usernames

📡 Detection & Monitoring

Log Indicators:

  • Audit log entries containing IPMI credentials
  • Multiple failed login attempts followed by successful logins

Network Indicators:

  • Unusual IPMI traffic patterns
  • Authentication requests from unexpected sources

SIEM Query:

source="xcc_audit_logs" AND (event_type="authentication" OR event_type="credential")

🔗 References

📤 Share & Export