Nozomi detects 13 BMC firmware vulnerabilities on Lanner hardware exposing OT, IoT devices to RCE attacks

Share:

Industrial cybersecurity company Nozomi Networks has identified thirteen vulnerabilities affecting baseboard management controllers (BMCs) of Lanner devices based on the American Megatrends (AMI) MegaRAC SP-X, five of which are rated as critical. By abusing these vulnerabilities, an unauthenticated attacker may achieve remote code execution (RCE) with root privileges on the BMC, compromising it and gaining control of the managed host.

The reveal by Nozomi Labs comes following research over the last year on the security of BMCs, focusing on OT (operational technology) and IoT (internet of things) devices. The researchers have also uncovered other vulnerabilities during their research whose patching is still in progress and thus cannot be disclosed.

BMCs were previously only found in IT server motherboards, whereas vendors are now broadening the scope of BMCs to cover the OT and IoT sectors. Nevertheless, their usability comes at the expense of a broader attack surface, and that may lead to an increase in the overall risk if they are not adequately protected.

During its research, Nozomi Labs analyzed Lanner IAC-AST2500A, an expansion card that enables BMC functionalities on Lanner appliances, Nozomi said in its blog post. “IAC-AST2500A’s firmware is based on the American Megatrends (AMI) MegaRAC SP-X solution, a BMC firmware also utilized by brands, such as Asus, Dell, Gigabyte, HP, Lenovo, or NVIDIA,” it added.

The Lanner hardware is IPMI 2.0 compliant and installed in the OPMA slot in the company’s network appliances. It supports Gigabit management port and provides individual management alone with a higher security level. With Lanner’s IPMI add-on cards, network appliances can be managed from a central location, enabling remote configuration, installation, reboot, and shutdown through firewalls and NATs.

Nozomi said that the BMC is a supplementary system-on-chip designed for remote monitoring and management of a computer. “Due to this dedicated network interface and tight coupling with critical hardware components (e.g. motherboard chipset), BMCs can perform fully remote low-level system operations, such as keyboard-and-mouse interaction straight from the bootstrap, system power control, BIOS firmware reflash, etc,” it added.

Among the available network services, the expansion card features a web application through which users can fully control the managed host as well as the BMC itself, Nozomi said.

Two of the vulnerabilities identified a possible attack chain whereby an unauthenticated attacker can achieve RCE with root privileges on the BMC. “During the login process, the web application asks through a confirmation dialog if the user wants to terminate any other active session on the logged-in account,” Nozomi said.

The functionality is implemented using an authenticated POST request, which is ultimately handled by the ‘KillDupUsr_func’ function of ‘spx_restservice,’ according to the research. “Although the POST request contains a QSESSIONID cookie, the function does not perform any verification checks on the user session. This flaw enables unauthenticated attackers to arbitrarily terminate active sessions of other users, causing a Denial-of-Service (DoS) condition. Further issues can be observed by proceeding with the analysis,” it added.

After sharing all vulnerabilities with Lanner through a responsible disclosure process, the vendor developed updated BMC firmware versions for the IAC-AST2500A that resolve all issues described in this blog, Nozomi said.

“The correct patched version strictly depends on the appliance in use; thus, we urge Lanner customers to contact technical support to receive the appropriate package,” the post said. “If asset owners are unable to patch their appliances, we advise enforcing firewall or network access control rules to restrict the network reachability of the web interface to trusted personnel only, or to actively monitor the network traffic via intrusion detection systems,” it added.

https://industrialcyber.co/news/nozomi-detects-13-bmc-firmware-vulnerabilities-on-lanner-hardware-exposing-ot-iot-devices-to-rce-attacks/

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
1:40 am, Jun 1, 2025
weather icon 16°C
L: 14° | H: 17°
few clouds
Humidity: 77 %
Pressure: 1015 mb
Wind: 10 mph W
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 20%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:49 am
Sunset: 9:07 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
14° | 17°°C 0.2 mm 20% 15 mph 79 % 1015 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
11° | 21°°C 0 mm 0% 12 mph 82 % 1019 mb 0 mm/h
Tue Jun 03 10:00 pm
weather icon
11° | 18°°C 1 mm 100% 15 mph 93 % 1013 mb 0 mm/h
Wed Jun 04 10:00 pm
weather icon
9° | 18°°C 0.48 mm 48% 12 mph 81 % 1011 mb 0 mm/h
Thu Jun 05 10:00 pm
weather icon
11° | 15°°C 1 mm 100% 16 mph 94 % 1011 mb 0 mm/h
Today 4:00 am
weather icon
13° | 15°°C 0 mm 0% 8 mph 79 % 1014 mb 0 mm/h
Today 7:00 am
weather icon
13° | 14°°C 0 mm 0% 10 mph 75 % 1015 mb 0 mm/h
Today 10:00 am
weather icon
17° | 17°°C 0 mm 0% 11 mph 45 % 1015 mb 0 mm/h
Today 1:00 pm
weather icon
20° | 20°°C 0 mm 0% 12 mph 37 % 1014 mb 0 mm/h
Today 4:00 pm
weather icon
20° | 20°°C 0 mm 0% 15 mph 39 % 1013 mb 0 mm/h
Today 7:00 pm
weather icon
18° | 18°°C 0.2 mm 20% 11 mph 57 % 1014 mb 0 mm/h
Today 10:00 pm
weather icon
15° | 15°°C 0 mm 0% 8 mph 72 % 1015 mb 0 mm/h
Tomorrow 1:00 am
weather icon
13° | 13°°C 0 mm 0% 7 mph 82 % 1016 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€92,078.12
0.52%
Ethereum(ETH)
€2,223.45
0.02%
Tether(USDT)
€0.88
0.01%
XRP(XRP)
€1.91
2.14%
Solana(SOL)
€137.74
0.23%
USDC(USDC)
€0.88
0.00%
Dogecoin(DOGE)
€0.169178
0.15%
Shiba Inu(SHIB)
€0.000011
0.95%
Pepe(PEPE)
€0.000011
0.44%
Peanut the Squirrel(PNUT)
€0.229114
4.06%
Scroll to Top