CVE-2025-65002

7.5 HIGH

📋 TL;DR

This vulnerability in Fujitsu iRMC S6 on M5 servers allows authentication bypass when usernames are exactly 16 characters long. Attackers can potentially gain unauthorized access to the Redfish/WebUI management interface. This affects organizations using vulnerable versions of Fujitsu server management controllers.

💻 Affected Systems

Products:
  • Fujitsu iRMC S6 on M5 servers
Versions: All versions before 1.37S
Operating Systems: Not OS-dependent - affects iRMC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with usernames exactly 16 characters long. The vulnerability is in the authentication mechanism of the Redfish/WebUI interface.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of server management interface leading to unauthorized configuration changes, firmware manipulation, or denial of service to the management system.

🟠

Likely Case

Unauthorized access to management interface allowing configuration changes, monitoring data access, or privilege escalation within the management system.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and monitoring of management interface access.

🌐 Internet-Facing: HIGH if management interface is exposed to internet, as authentication bypass could allow remote compromise.
🏢 Internal Only: MEDIUM as internal attackers could exploit this to gain unauthorized management access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires knowledge of the vulnerability and ability to create or use a 16-character username. No authentication bypass for existing accounts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.37S

Vendor Advisory: https://security.ts.fujitsu.com/ProductSecurity/content/FsasTech-PSIRT-FTI-ISS-2025-082610-Security-Notice.pdf

Restart Required: Yes

Instructions:

1. Download firmware version 1.37S from Fujitsu support portal. 2. Upload firmware to iRMC via web interface or remote management. 3. Apply firmware update. 4. Reboot the server to complete installation.

🔧 Temporary Workarounds

Username length restriction

all

Ensure no usernames in the system are exactly 16 characters long

Network segmentation

all

Restrict access to iRMC management interface to trusted networks only

🧯 If You Can't Patch

  • Implement strict network access controls to limit iRMC interface access
  • Monitor authentication logs for unusual access patterns or failed login attempts

🔍 How to Verify

Check if Vulnerable:

Check iRMC firmware version via web interface or SSH: version should be less than 1.37S

Check Version:

ssh admin@irmc-ip 'show version' or check via web interface under System Information

Verify Fix Applied:

Verify firmware version is 1.37S or later in iRMC web interface or via SSH

📡 Detection & Monitoring

Log Indicators:

  • Authentication attempts with 16-character usernames
  • Unusual access patterns to Redfish/WebUI interface
  • Failed login attempts followed by successful access

Network Indicators:

  • Unusual traffic to iRMC management ports (typically 443, 22)
  • Access from unexpected source IPs to management interface

SIEM Query:

source="irmc" AND (event_type="authentication" AND username_length=16) OR (event_type="access" AND user_agent="*Redfish*" AND src_ip NOT IN allowed_ips)

🔗 References

📤 Share & Export