5 results (0.009 seconds)

CVSS: 7.5EPSS: 0%CPEs: 724EXPL: 0

A web server in the Intelligent Platform Management Interface (IPMI) baseboard management controller (BMC) implementation on Supermicro X11 and M11 based devices, with firmware versions up to 3.17.02, allows remote unauthenticated users to perform directory traversal, potentially disclosing sensitive information. Un servidor web en la implementación de Baseboard Management Controller (BMC) de Intelligent Platform Management Interface (IPMI) en dispositivos basados en Supermicro X11 y M11, con versiones de firmware hasta 3.17.02, permite a usuarios remotos no autenticados realizar recorridos de directorio, revelando potencialmente información confidencial. • http://supermicro.com https://www.supermicro.com/en/support/security_BMC_Dec_2023 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 0%CPEs: 724EXPL: 0

The web interface in the Intelligent Platform Management Interface (IPMI) baseboard management controller (BMC) implementation on Supermicro X11 and M11 based devices, with firmware versions before 3.17.02, allows remote authenticated users to execute arbitrary commands via a crafted request targeting vulnerable cgi endpoints. La interfaz web en la implementación de Baseboard Management Controller (BMC) de Intelligent Platform Management Interface (IPMI) en dispositivos basados en Supermicro X11 y M11, con versiones de firmware anteriores a la 3.17.02, permite a usuarios remotos autenticados ejecutar comandos arbitrarios a través de una solicitud manipulada dirigida a endpoints cgi vulnerables. • http://supermicro.com https://www.supermicro.com/en/support/security_BMC_Dec_2023 •

CVSS: 8.8EPSS: 0%CPEs: 724EXPL: 0

The configuration functionality in the Intelligent Platform Management Interface (IPMI) baseboard management controller (BMC) implementation on Supermicro X11 and M11 based devices, with firmware versions through 3.17.02, allows remote authenticated users to execute arbitrary commands. La funcionalidad de configuración en la implementación de Baseboard Management Controller (BMC) de Intelligent Platform Management Interface (IPMI) en dispositivos basados en Supermicro X11 y M11, con versiones de firmware hasta la 3.17.02, permite a los usuarios autenticados remotamente ejecutar comandos arbitrarios. • http://supermicro.com https://www.supermicro.com/en/support/security_BMC_Dec_2023 • CWE-798: Use of Hard-coded Credentials •

CVSS: 10.0EPSS: 0%CPEs: 676EXPL: 0

On Supermicro H11, H12, M11, X9, X10, and X11 products, a combination of encryption and authentication problems in the virtual media service allows capture of BMC credentials and data transferred over virtual media devices. Attackers can use captured credentials to connect virtual USB devices to the server managed by the BMC. En los productos Supermicro H11, H12, M11, X9, X10 y X11, una combinación de problemas de cifrado y autenticación en el servicio multimedia virtual permite la captura de credenciales de BMC y datos transferidos mediante dispositivos multimedia virtuales. Los atacantes pueden usar credenciales capturadas para conectar dispositivos USB virtuales en el servidor administrado por el BMC. • https://eclypsium.com/2019/09/03/usbanywhere-bmc-vulnerability-opens-servers-to-remote-attack https://github.com/eclypsium/USBAnywhere https://www.supermicro.com/support/security_BMC_virtual_media.cfm • CWE-287: Improper Authentication CWE-326: Inadequate Encryption Strength CWE-522: Insufficiently Protected Credentials •

CVSS: 10.0EPSS: 0%CPEs: 530EXPL: 0

On Supermicro X10 and X11 products, a client's access privileges may be transferred to a different client that later has the same socket file descriptor number. In opportunistic circumstances, an attacker can simply connect to the virtual media service, and then connect virtual USB devices to the server managed by the BMC. En los productos Supermicro X10 y X11, los privilegios de acceso de un cliente pueden ser transferidos hacia un cliente diferente que luego tenga el mismo número de descriptor de archivo de socket. En circunstancias oportunistas, un atacante puede simplemente conectarse al servicio multimedia virtual y luego conectarse a dispositivos USB virtuales en el servidor administrado por el BMC. • https://eclypsium.com/2019/09/03/usbanywhere-bmc-vulnerability-opens-servers-to-remote-attack https://github.com/eclypsium/USBAnywhere https://www.supermicro.com/support/security_BMC_virtual_media.cfm •