First published: Fri Dec 19 2014(Updated: )
The IPMI 1.5 functionality in Dell iDRAC6 modular before 3.65, iDRAC6 monolithic before 1.98, and iDRAC7 before 1.57.57 does not properly select session ID values, which makes it easier for remote attackers to execute arbitrary commands via a brute-force attack.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dell iDRAC6 | <=3.60 | |
Dell iDRAC7 Firmware | <=1.56.55 | |
Intel Intelligent Platform Management Interface | =1.5 | |
Dell iDRAC6 modular | <=1.97 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8272 is classified as a high severity vulnerability due to its potential to allow remote attackers to execute arbitrary commands.
To fix CVE-2014-8272, update your Dell iDRAC6 or iDRAC7 firmware to the latest version that addresses this vulnerability.
CVE-2014-8272 affects Dell iDRAC6 modular versions earlier than 3.65, iDRAC6 monolithic versions earlier than 1.98, and iDRAC7 versions earlier than 1.57.57.
Yes, CVE-2014-8272 can be exploited remotely through brute-force attacks on session IDs.
The impact of CVE-2014-8272 is the potential unauthorized execution of arbitrary commands on affected systems.