Advisory Published
Updated

CVE-2021-26581

First published: Thu Apr 01 2021(Updated: )

A potential security vulnerability has been identified in HPE Superdome Flex server. A denial of service attack can be remotely exploited leaving hung connections to the BMC web interface. The monarch BMC must be rebooted to recover from this situation. Other BMC management is not impacted. HPE has made the following software update to resolve the vulnerability in HPE Superdome Flex Server: Superdome Flex Server Firmware 3.30.142 or later.

Credit: security-alert@hpe.com

Affected SoftwareAffected VersionHow to fix
Hpe Superdome Flex Server Firmware<3.30.142
HPE Superdome Flex Server

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2021-26581?

    CVE-2021-26581 is a potential security vulnerability identified in the HPE Superdome Flex server where a denial of service attack can leave hung connections to the BMC web interface, requiring a reboot of the monarch BMC for recovery.

  • How can CVE-2021-26581 be exploited?

    CVE-2021-26581 can be exploited remotely through a denial of service attack, causing hung connections to the BMC web interface.

  • What is the impact of CVE-2021-26581?

    The impact of CVE-2021-26581 is a denial of service attack that can leave hung connections to the BMC web interface, requiring a reboot of the monarch BMC for recovery.

  • What is the severity of CVE-2021-26581?

    The severity of CVE-2021-26581 is medium with a CVSS score of 6.5.

  • How can I fix CVE-2021-26581?

    To fix CVE-2021-26581, update the HPE Superdome Flex server firmware to version 3.30.142 or higher as recommended by HPE.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203