Critical IPMI Vulnerability Advisory [Expired]
Posted by Kevin Stange on 27 June 2014 03:35 AM |
|
A recently disclosed vulnerability has been found to be exploitable on many varieties of Supermicro server motherboards. We have verified that the vulnerability is being actively exploited across the Internet. Due to the severity of this issue, we have immediately suspended ALL IPMI access to customer dedicated servers. This change is not permanent. However, access to IPMI management will not be restored until new access procedures are in place to reduce risks to customers. If you are co-locating Supermicro servers at Steadfast and using the IPMI feature, please check the Supermicro web site for the latest version of the IPMI firmware for your motherboard and upgrade your controller. If you are unable to do so, or there is no update for your motherboard, please use the ipmicfg utility or system BIOS to make sure the controller is not accessible on the Internet, or configure a firewall on the edge of your network to block public access to the IPMI controllers. Please be aware that publicly accessible, exploitable IPMI controllers can be used to take control of an affected server, and the IPMI controller itself can be used to attack other systems or perform abuse. Traffic flooding from your co-located server running IPMI could result in bandwidth overages. Unchecked abusive behavior could result in suspension of service. If you need to reboot or console a dedicated server while IPMI systems are unavailable, or if you have any questions, please contact support via our helpdesk. We apologize for any inconvenience this may cause. | |