Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-28190 : What You Need to Know

Discover details about CVE-2021-28190, a critical buffer overflow vulnerability in ASUS BMC firmware. Find impacted systems, exploitation, and mitigation steps.

This article provides insights into a CVE-2021-28190 vulnerability found in the ASUS BMC firmware. The vulnerability allows remote attackers to exploit a buffer overflow in the web management page, potentially leading to a denial of service.

Understanding CVE-2021-28190

CVE-2021-28190 highlights a critical buffer overflow vulnerability in ASUS BMC firmware's Generate new certificate function. Attackers could abuse this flaw to disrupt the web service.

What is CVE-2021-28190?

The flaw in ASUS BMC firmware's web management page allows attackers to trigger a buffer overflow due to unchecked user input lengths, potentially leading to service termination.

The Impact of CVE-2021-28190

The buffer overflow vulnerability in ASUS BMC firmware can be exploited by remote attackers to disrupt the web service, resulting in a denial-of-service condition.

Technical Details of CVE-2021-28190

The vulnerability in ASUS BMC firmware arises from a lack of validation of user input lengths, leading to a buffer overflow condition. This allows attackers to crash the web service.

Vulnerability Description

The flaw originates from a specific function in ASUS BMC firmware that fails to verify user input lengths, enabling malicious actors to trigger a buffer overflow and shut down the web service.

Affected Systems and Versions

Various ASUS BMC firmware versions across different products are impacted by this vulnerability, including versions 1.09 to 1.15.6 across multiple products.

Exploitation Mechanism

By sending specifically crafted requests to the affected ASUS BMC firmware version's web management page, attackers can exploit the buffer overflow vulnerability to disrupt the web service.

Mitigation and Prevention

To address CVE-2021-28190, users are advised to update ASUS BMC firmware to the patched versions listed below:

        ESC4000 G4X 1.15.6
        RS700-E9-RS12 1.15.4
        RS100-E10-PI2 1.15.3
        RS300-E10-PS4 1.15.3
        RS300-E10-RS4 1.15.3
        and so on...

Immediate Steps to Take

Ensure all affected ASUS BMC firmware versions are updated to the latest patched versions highlighted above to mitigate the buffer overflow vulnerability.

Long-Term Security Practices

Regularly monitor ASUS security advisories and promptly apply firmware updates to ensure that systems remain protected from known vulnerabilities.

Patching and Updates

Continue to monitor ASUS's security advisories for any new updates or patches related to ASUS BMC firmware to enhance the security posture of affected systems.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now