Learn about CVE-2021-28179 affecting ASUS BMC firmware, a Buffer overflow vulnerability allowing remote attackers to disrupt web services. Find mitigation steps and update details.
A Buffer overflow vulnerability in ASUS BMC's firmware Web management page can allow remote attackers to terminate the Web service abnormally.
Understanding CVE-2021-28179
This vulnerability affects ASUS BMC firmware for specific products, leading to a Buffer overflow threat.
What is CVE-2021-28179?
The vulnerability arises from a lack of string length verification in the media support configuration setting of ASUS BMC firmware.
The Impact of CVE-2021-28179
With a CVSS base score of 4.9, this Medium-severity flaw allows remote attackers to disrupt web services on affected devices.
Technical Details of CVE-2021-28179
The vulnerability is classified as CWE-120 Buffer Overflow and has a LOW attack complexity with a HIGH availability impact.
Vulnerability Description
The ASUS BMC firmware fails to validate user input string length properly, resulting in the Buffer overflow risk.
Affected Systems and Versions
Products impacted include BMC firmware for Z10PR-D16, ASMB8-iKVM, and Z10PE-D16 WS with specific versions mentioned.
Exploitation Mechanism
Remote attackers with high privileges can exploit the flaw to gain unauthorized access and disrupt web services.
Mitigation and Prevention
It is crucial to take immediate actions to address and prevent the CVE-2021-28179 vulnerability.
Immediate Steps to Take
Update ASUS BMC firmware to the fixed versions: Z10PR-D16 1.16.1, ASMB8-iKVM 1.16.1, Z10PE-D16 WS 1.16.1.
Long-Term Security Practices
Regularly monitor and apply security updates to ensure the protection of BMC firmware.
Patching and Updates
Stay informed about security advisories and promptly apply patches to mitigate the risk of vulnerabilities.