{"id":70086,"date":"2014-07-15T21:32:38","date_gmt":"2014-07-16T01:32:38","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-11-28T16:12:05","modified_gmt":"2021-11-28T21:12:05","slug":"more-server-admin-passwords-exposed","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/more-server-admin-passwords-exposed\/","title":{"rendered":"More Server Admin Passwords Exposed"},"content":{"rendered":"<p><em><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-107170\" title=\"More Server Admin Passwords Exposed\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cloud_storm-3.png?resize=142%2C100&#038;ssl=1\" alt=\"More Server Admin Passwords Exposed\" width=\"142\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cloud_storm-3.png?resize=150%2C106&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cloud_storm-3.png?resize=75%2C53&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/cloud_storm-3.png?w=361&amp;ssl=1 361w\" sizes=\"auto, (max-width: 142px) 100vw, 142px\" \/>I just <a title=\"Server Management Security Hole\" href=\"http:\/\/wp.me\/p2wgaW-iae\" target=\"_blank\" rel=\"noopener noreferrer\">wrote<\/a> about the hole in <strong><a title=\"Intelligent Platform Management Interface\" href=\"http:\/\/en.wikipedia.org\/wiki\/Intelligent_Platform_Management_Interface\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">IPMI<\/a><\/strong> and now researchers are reporting <strong>more problems<\/strong>.<\/em> <a title=\"Help Net Security\" href=\"https:\/\/www.helpnetsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Help Net Security<\/em><\/a> writes that over <strong>30,000 servers<\/strong> with the <strong><a title=\"Supermicro\" href=\"http:\/\/www.supermicro.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Super Micro<\/a><\/strong> WPCM450 line of chips on their motherboards have baseboard management controllers (<a title=\"Supermicro Intelligent Management\" href=\"http:\/\/www.supermicro.com\/products\/nfo\/IPMI.cfm\" target=\"_blank\" rel=\"noopener noreferrer\">BMCs<\/a>) that offer up <strong>administrator passwords to anyone<\/strong> who knows where to look. <a title=\"Zachary Wikholm\" href=\"https:\/\/www.linkedin.com\/pub\/zachary-wikholm\/60\/476\/355\" target=\"_blank\" rel=\"noopener noreferrer\">Zachary Wikholm<\/a>, a senior security engineer with the Security Incident Response Team of hosting provider <a title=\"CARI.net\" href=\"https:\/\/www.cari.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">CARI.net<\/a> warns that BMC&#8217;s which collect information on the health of the hardware and software data do not protect this critical information, Mr. Wikholm wrote;<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em><a href=\"https:\/\/web.archive.org\/web\/20140929214746\/http:\/\/www.amsimaging.com:80\/blog\/bid\/149995\/Protect-Your-Confidential-Information-Documents-with-OnBase\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-107173\" title=\"critical files can be accessed\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/secure-documents-e1570147994868-134x150.jpg?resize=85%2C95&#038;ssl=1\" alt=\"critical files can be accessed\" width=\"85\" height=\"95\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/secure-documents-e1570147994868.jpg?resize=134%2C150&amp;ssl=1 134w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/secure-documents-e1570147994868.jpg?resize=67%2C75&amp;ssl=1 67w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/secure-documents-e1570147994868.jpg?w=176&amp;ssl=1 176w\" sizes=\"auto, (max-width: 85px) 100vw, 85px\" \/><\/a>You can quite literally download the BMC password file from any <a title=\"Universal Plug and Play\" href=\"http:\/\/en.wikipedia.org\/wiki\/Universal_Plug_and_Play\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">UPnP<\/a>-enabled Super Micro motherboard running IPMI on a public interface<\/em><\/p>\n<p>The article explains this confidential information is available because Super Micro created the <strong>password file in plain text<\/strong>. The file can be downloaded by simply connecting to port 49152. The researcher added that many more critical files can be accessed by the public;<\/p>\n<p style=\"text-align: justify; padding-left: 30px;\"><em>All the contents of the \/nv\/ directory are accessible via browser including the server.pem file, the wsman admin password and the netconfig files<\/em><\/p>\n<p><em>Help Net Security<\/em> confirms that Super Micro no longer uses the WPCM450 chips. But a scan of the Internet using <a title=\"Shodan\" href=\"http:\/\/www.shodanhq.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Shodan<\/a>, a specialized search engine for finding <a title=\"Embedded system\" href=\"http:\/\/en.wikipedia.org\/wiki\/Embedded_system\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">embedded systems<\/a>, indicated <strong>31,964 affected systems were online<\/strong>. The company has also offered up a fix, to this vulnerability which requires administrators to re-flash their systems with the new IPMI <a title=\"BIOS\" href=\"http:\/\/en.wikipedia.org\/wiki\/BIOS\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">BIOS<\/a>. This workaround is not available to all servers, especially in 24&#215;7 shops.<\/p>\n<p><a href=\"http:\/\/league-of-redheads.melissapohl.com\/facts.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-107175\" title=\"Patch your systems\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/band-aid-2.png?resize=56%2C55&#038;ssl=1\" alt=\"Patch your systems\" width=\"56\" height=\"55\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/band-aid-2.png?resize=150%2C148&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/band-aid-2.png?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/band-aid-2.png?w=566&amp;ssl=1 566w\" sizes=\"auto, (max-width: 56px) 100vw, 56px\" \/><\/a>Mr. Wikholm has stepped in and has devised a <strong>temporary fix<\/strong> for those who don&#8217;t want to risk re-flashing the server IPMI BIOS. The fix centers around <strong>killing <\/strong><strong><a title=\"UPnP\" href=\"http:\/\/en.wikipedia.org\/wiki\/Universal_Plug_and_Play\" target=\"_blank\" rel=\"noopener noreferrer\">UPnP<\/a> processes<\/strong> on the BMC. The drawback of the fix is that it lasts only as long as the system isn&#8217;t disconnected or rebooted.<\/p>\n<p>The existence and the exploitation potential of the flaw was <strong><a title=\"New Supermicro IPMI\/BMC Vulnerability\" href=\"https:\/\/web.archive.org\/web\/20220225000719\/https:\/\/isc.sans.edu\/diary\/New+Supermicro+IPMIBMC+Vulnerability\/18285\" target=\"_blank\" rel=\"noopener noreferrer\">confirmed<\/a> by <\/strong><a title=\"SANS\" href=\"https:\/\/isc.sans.edu\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>SANS<\/strong> ISC<\/a> handler Tony Carothers: &#8220;One of our team has tested this vulnerability, and it works like a champ, so let\u2019s add another log to the fire and spread the good word.&#8221;<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>Fortunately Super Micro no longer sells this chipset, but there are still over 30K of these time-bombs out there waiting to explode on some poor sysadmin. Hopefully checking out the IPMI BMC is now part of a standard device hardening policy. if not, it should be.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/community.rapid7.com\/community\/metasploit\/blog\/2013\/07\/02\/a-penetration-testers-guide-to-ipmi\" target=\"_blank\" rel=\"noopener noreferrer\">A Penetration Tester&#8217;s Guide to IPMI and BMCs<\/a> (community.rapid7.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p style=\"font-weight: inherit; font-style: inherit; text-align: left;\"><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>30,000 servers with Super Micro baseboard management controllers (BMCs) offer up plain text administrator passwords to anyone who knows where to look<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2292,2142,2143,2541,2187,2173,4,2174,2175,1501],"class_list":["post-70086","post","type-post","status-publish","format-standard","hentry","category-security","tag-2292","tag-bmc","tag-ipmi","tag-passwords","tag-plain-text","tag-sans","tag-security","tag-super-micro","tag-upnp","tag-vulnerability"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/70086","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=70086"}],"version-history":[{"count":9,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/70086\/revisions"}],"predecessor-version":[{"id":131336,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/70086\/revisions\/131336"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=70086"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=70086"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=70086"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}