Description Preview
Overview
This vulnerability (CWE-798: Use of Hard-coded Credentials) affects the Lanner Inc IAC-AST2500A Baseboard Management Controller (BMC) firmware. The BMC uses a hard-coded TLS certificate for HTTPS connections, which compromises the security model of TLS. Normally, TLS certificates provide authentication and encryption to prevent eavesdropping and tampering. However, when a certificate is hard-coded in the firmware, an attacker with knowledge of this certificate can impersonate the server and intercept all communications. This vulnerability is particularly concerning in Operational Technology (OT) and Internet of Things (IoT) environments where these devices may be deployed, as it could allow attackers to gain access to sensitive industrial control systems or other critical infrastructure.
Remediation
- Update to the latest firmware version if the vendor has released a patch addressing this vulnerability.
- If updates are not available, consider implementing network segmentation to restrict access to the affected devices.
- Monitor network traffic to and from these devices for suspicious activities.
- Consider implementing additional authentication mechanisms beyond the device's built-in security.
- Contact Lanner Inc. for specific remediation guidance and patch availability.
- If possible, disable remote management interfaces when not in use.
- Implement compensating controls such as VPNs or other encrypted tunnels when accessing the device remotely.
References
-
Nozomi Networks Blog: "Vulnerabilities in BMC Firmware Affect OT/IoT Device Security (Part 1)" https://www.nozominetworks.com/blog/vulnerabilities-in-bmc-firmware-affect-ot-iot-device-security-part-1/
-
Nozomi Networks Vulnerability Advisory for CVE-2021-4228: https://www.nozominetworks.com/labs/vulnerability-advisories/cve-2021-4228/
-
Common Weakness Enumeration (CWE-798): Use of Hard-coded Credentials https://cwe.mitre.org/data/definitions/798.html
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- ConstructionConstruction
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Health Care & Social AssistanceHealth Care & Social Assistance
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- ManufacturingManufacturing
- MiningMining
- Other Services (except Public Administration)Other Services (except Public Administration)
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Public AdministrationPublic Administration
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- Retail TradeRetail Trade
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Wholesale TradeWholesale Trade