Lucene search

K
vulnrichmentCertccVULNRICHMENT:CVE-2024-3411
HistoryApr 30, 2024 - 6:39 p.m.

CVE-2024-3411 Insufficient Randomness When Validating an IPMI Authenticated Session

2024-04-3018:39:36
certcc
github.com
5
ipmi
authenticated
session
validation
insufficient randomness
security controls
ipmi session id
bmc device
session hijacking
spoofed ipmi packets

AI Score

9.3

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Implementations of IPMI Authenticated sessions does not provide enough randomness to protect from session hijacking, allowing an attacker to use either predictable IPMI Session ID or weak BMC Random Number to bypass security controls using spoofed IPMI packets to manage BMC device.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:h:intel:*:*:*:*:*:*:*:*:*"
    ],
    "vendor": "intel",
    "product": "*",
    "versions": [
      {
        "status": "affected",
        "version": "IPMI 2.0, revision 1.1E7"
      }
    ],
    "defaultStatus": "unknown"
  }
]

AI Score

9.3

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-3411