Support Center > 详细页 > 安全公告详细

Security Advisory - Security Updates On Kaytus Server BMC Password Reset Vulnerability

  • SA No KAYTUS-SA-202308-001
  • Initial Release Date 2023-08-23 10:42:24
  • last Release Date 2024-10-31 17:41:57
  • Source Internal discovery
  • Potential Security Impact Reset BMC Password
Vulnerability Summary

Due to incomplete cleaning of obsolete functional interfaces in some old versions of BMC firmware on Kaytus Server, attackers may exploit this vulnerability to modify the password of BMC management system. 

Vulnerability Scoring Details
3.1 Vector(Base) Base Score V3.1 Vector(Temporal Score) Temporal Score
AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L 8.6 E:P/RL:O/RC:C 7.7

Fixed Product Version
Products Affected Version FW Version
NF5280M5 4.27.1<= NF5280M5 <= 4.27.9 NF5280M5_BMC_4.28.1_Standard_20220715
NF5266M5 3.21.2<= NF5266M5 <= 4.0.5 NF5266M5_BMC_4.0.6_standard_20220518
NF5280M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
SA5280M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
NF5688M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
NF5260M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
SA5212M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
NF5260FM6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
SA5212FM6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
NF5488M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
NF5270M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
SA5270M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
NF5266M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
NF5466M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
NF5180M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
SA5112M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
NF5468M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
NF5688M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
SA5266M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
SN5160FM6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
I24M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
I48M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
IR5280M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
IR8480M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
IR5266M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604
IR5468M6 4.11.07 <= ISBMC <= 4.15.01 ISBMC_Whitley_4.15.03_Standard_20220604

Resolution

Please visit the support center directly to obtain patches and related technical support.

Revision History

2023-08-23 V1.0 INITIAL

References

NA

Support

For issues about implementing the recommendations of this Security Bulletin, contact normal KAYTUS Services Support channel. For other issues about the content of this Security Bulletin, send e-mail to sec@kaytus.com.

Report

To report a potential security vulnerability for KAYTUS product: Reporting a Security Vulnerability

Declaration

KAYTUS shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, KAYTUS disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement. In no event shall KAYTUS or any of its directly or indirectly controlled subsidiaries or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages. Your use of the document, by whatsoever means, will be totally at your own risk. KAYTUS is entitled to amend or update this document from time to time.