Nozomi detects 13 BMC firmware vulnerabilities on Lanner hardware exposing OT, IoT devices to RCE attacks

Share:

Industrial cybersecurity company Nozomi Networks has identified thirteen vulnerabilities affecting baseboard management controllers (BMCs) of Lanner devices based on the American Megatrends (AMI) MegaRAC SP-X, five of which are rated as critical. By abusing these vulnerabilities, an unauthenticated attacker may achieve remote code execution (RCE) with root privileges on the BMC, compromising it and gaining control of the managed host.

The reveal by Nozomi Labs comes following research over the last year on the security of BMCs, focusing on OT (operational technology) and IoT (internet of things) devices. The researchers have also uncovered other vulnerabilities during their research whose patching is still in progress and thus cannot be disclosed.

BMCs were previously only found in IT server motherboards, whereas vendors are now broadening the scope of BMCs to cover the OT and IoT sectors. Nevertheless, their usability comes at the expense of a broader attack surface, and that may lead to an increase in the overall risk if they are not adequately protected.

During its research, Nozomi Labs analyzed Lanner IAC-AST2500A, an expansion card that enables BMC functionalities on Lanner appliances, Nozomi said in its blog post. “IAC-AST2500A’s firmware is based on the American Megatrends (AMI) MegaRAC SP-X solution, a BMC firmware also utilized by brands, such as Asus, Dell, Gigabyte, HP, Lenovo, or NVIDIA,” it added.

The Lanner hardware is IPMI 2.0 compliant and installed in the OPMA slot in the company’s network appliances. It supports Gigabit management port and provides individual management alone with a higher security level. With Lanner’s IPMI add-on cards, network appliances can be managed from a central location, enabling remote configuration, installation, reboot, and shutdown through firewalls and NATs.

Nozomi said that the BMC is a supplementary system-on-chip designed for remote monitoring and management of a computer. “Due to this dedicated network interface and tight coupling with critical hardware components (e.g. motherboard chipset), BMCs can perform fully remote low-level system operations, such as keyboard-and-mouse interaction straight from the bootstrap, system power control, BIOS firmware reflash, etc,” it added.

Among the available network services, the expansion card features a web application through which users can fully control the managed host as well as the BMC itself, Nozomi said.

Two of the vulnerabilities identified a possible attack chain whereby an unauthenticated attacker can achieve RCE with root privileges on the BMC. “During the login process, the web application asks through a confirmation dialog if the user wants to terminate any other active session on the logged-in account,” Nozomi said.

The functionality is implemented using an authenticated POST request, which is ultimately handled by the ‘KillDupUsr_func’ function of ‘spx_restservice,’ according to the research. “Although the POST request contains a QSESSIONID cookie, the function does not perform any verification checks on the user session. This flaw enables unauthenticated attackers to arbitrarily terminate active sessions of other users, causing a Denial-of-Service (DoS) condition. Further issues can be observed by proceeding with the analysis,” it added.

After sharing all vulnerabilities with Lanner through a responsible disclosure process, the vendor developed updated BMC firmware versions for the IAC-AST2500A that resolve all issues described in this blog, Nozomi said.

“The correct patched version strictly depends on the appliance in use; thus, we urge Lanner customers to contact technical support to receive the appropriate package,” the post said. “If asset owners are unable to patch their appliances, we advise enforcing firewall or network access control rules to restrict the network reachability of the web interface to trusted personnel only, or to actively monitor the network traffic via intrusion detection systems,” it added.

https://industrialcyber.co/news/nozomi-detects-13-bmc-firmware-vulnerabilities-on-lanner-hardware-exposing-ot-iot-devices-to-rce-attacks/

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
2:01 pm, May 18, 2025
weather icon 15°C
L: 14° | H: 17°
few clouds
Humidity: 58 %
Pressure: 1020 mb
Wind: 4 mph ENE
Wind Gust: 10 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 17%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 5:04 am
Sunset: 8:49 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
14° | 17°°C 0 mm 0% 7 mph 66 % 1020 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
11° | 18°°C 0 mm 0% 11 mph 82 % 1022 mb 0 mm/h
Tue May 20 10:00 pm
weather icon
9° | 20°°C 0 mm 0% 8 mph 79 % 1022 mb 0 mm/h
Wed May 21 10:00 pm
weather icon
12° | 18°°C 1 mm 100% 9 mph 93 % 1019 mb 0 mm/h
Thu May 22 10:00 pm
weather icon
9° | 17°°C 0 mm 0% 10 mph 63 % 1023 mb 0 mm/h
Today 4:00 pm
weather icon
16° | 17°°C 0 mm 0% 7 mph 55 % 1020 mb 0 mm/h
Today 7:00 pm
weather icon
16° | 17°°C 0 mm 0% 6 mph 52 % 1019 mb 0 mm/h
Today 10:00 pm
weather icon
13° | 13°°C 0 mm 0% 6 mph 66 % 1020 mb 0 mm/h
Tomorrow 1:00 am
weather icon
12° | 12°°C 0 mm 0% 7 mph 69 % 1020 mb 0 mm/h
Tomorrow 4:00 am
weather icon
11° | 11°°C 0 mm 0% 6 mph 82 % 1020 mb 0 mm/h
Tomorrow 7:00 am
weather icon
12° | 12°°C 0 mm 0% 7 mph 73 % 1021 mb 0 mm/h
Tomorrow 10:00 am
weather icon
16° | 16°°C 0 mm 0% 8 mph 51 % 1021 mb 0 mm/h
Tomorrow 1:00 pm
weather icon
18° | 18°°C 0 mm 0% 10 mph 45 % 1021 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€93,090.24
0.91%
Ethereum(ETH)
€2,243.86
1.20%
Tether(USDT)
€0.90
0.00%
XRP(XRP)
€2.14
1.94%
Solana(SOL)
€153.50
2.35%
USDC(USDC)
€0.90
0.00%
Dogecoin(DOGE)
€0.200507
3.95%
Shiba Inu(SHIB)
€0.000013
3.94%
Pepe(PEPE)
€0.000012
7.53%
Peanut the Squirrel(PNUT)
€0.307724
14.29%
Scroll to Top