Headline
CVE-2021-26728: spx_restservice KillDupUsr_func Command Injection and Stack-Based Buffer Overflow CVE-2021-26728 – Nozomi Networks
Command injection and stack-based buffer overflow vulnerabilities in the KillDupUsr_func function of spx_restservice allow an attacker to execute arbitrary code with the same privileges as the server user (root). This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
CVE-2021-26728
Summary
Command injection and stack-based buffer overflow vulnerabilities in the KillDupUsr_func function of spx_restservice allow an attacker to execute arbitrary code with the same privileges as the server user (root).
Impact
An un-authenticated remote attacker would be able to execute arbitrary code with root privileges on the BMC and, potentially, abuse it to also compromise the managed host.
Issue Date
October 21, 2022
Affects
The vulnerability affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0
CVSS Details
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Solution
Updated BMC firmware versions that fix the issue are available from Lanner technical support
Acknowledgments
Andrea Palanca of Nozomi Networks
**Threat **Intelligence****
****Curated and maintained by Nozomi Networks Labs, the Threat Intelligence™ service provides threat and vulnerability updates to Guardian, making it easy for IT/OT professionals to stay on top of current OT and IoT risks.****
Threat actors love finding new ways to attack critical infrastructure. We love finding new ways to detect their malware before damage occurs.
Let’s get started
Discover how easy it is to anticipate, diagnose and respond to cyber threats and process issues before they impact your operations.
Related news
Over a dozen security flaws have been discovered in baseboard management controller (BMC) firmware from Lanner that could expose operational technology (OT) and internet of things (IoT) networks to remote attacks. BMC refers to a specialized service processor, a system-on-chip (SoC), that's found in server motherboards and is used for remote monitoring and management of a host system, including
Command injection and stack-based buffer overflow vulnerabilities in the KillDupUsr_func function of spx_restservice allow an attacker to execute arbitrary code with the same privileges as the server user (root). This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
Observable discrepancies in the login process allow an attacker to guess legitimate user names registered in the BMC. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.