Learn about CVE-2021-26732, a medium-severity vulnerability in spx_restservice allowing unauthorized network configuration changes. Find mitigation steps and firmware updates.
A broken access control vulnerability in the First_network_func function of spx_restservice allows unauthorized changes to the network configuration of the BMC.
Understanding CVE-2021-26732
This vulnerability affects Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
What is CVE-2021-26732?
The CVE-2021-26732 vulnerability is a broken access control flaw in the spx_restservice's First_network_func function that permits malicious actors to manipulate the BMC's network settings.
The Impact of CVE-2021-26732
The impact of this vulnerability is rated as medium with a CVSS base score of 6.5. Although it requires no specific privileges or user interaction, attackers can cause low integrity and availability impact.
Technical Details of CVE-2021-26732
Vulnerability Description
The vulnerability arises due to improper access control (CWE-284), enabling threat actors to modify the BMC's network configuration without proper authorization.
Affected Systems and Versions
Lanner Inc's IAC-AST2500A standard firmware version 1.10.0 is confirmed to be impacted by this vulnerability.
Exploitation Mechanism
By leveraging the broken access control flaw in the First_network_func function of spx_restservice, attackers can manipulate the BMC's network configuration, potentially leading to unauthorized access or network disruptions.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Visit the official Lanner Inc website for firmware updates and security patches to safeguard against CVE-2021-26732.