Discover the impact of CVE-2021-28192, a medium-severity ASUS BMC's firmware vulnerability allowing remote attackers to terminate Web service. Learn about affected systems, versions, and mitigation steps.
A Buffer overflow vulnerability in ASUS BMC's firmware Web management page allows remote attackers to terminate the Web service abnormally. This was reported on 6th April 2021.
Understanding CVE-2021-28192
This CVE details a buffer overflow vulnerability in ASUS BMC's firmware, specifically related to the Remote video storage function.
What is CVE-2021-28192?
The vulnerability in ASUS BMC's firmware Web management page allows remote attackers to exploit a buffer overflow due to lack of string length verification, leading to a risk of Web service termination.
The Impact of CVE-2021-28192
With a CVSS base score of 4.9 (Medium severity), the vulnerability poses a high impact on availability. Remote attackers can exploit this issue without user interaction, requiring high privileges.
Technical Details of CVE-2021-28192
This section covers the vulnerability description, affected systems and versions, as well as the exploitation mechanism.
Vulnerability Description
The specific function in ASUS BMC's firmware Web management page does not verify the string length entered by users, resulting in a Buffer overflow vulnerability.
Affected Systems and Versions
Exploitation Mechanism
Remote attackers exploit the buffer overflow vulnerability to gain privileged access and terminate the Web service.
Mitigation and Prevention
To address this vulnerability, users are advised to update BMC's firmwares to the recommended versions provided by ASUS.
Immediate Steps to Take
Immediate actions include updating the affected BMC firmwares to the specified versions to mitigate the risk of exploitation.
Long-Term Security Practices
Regularly monitor security advisories from ASUS and apply firmware updates promptly to safeguard against vulnerabilities.
Patching and Updates
Ensure the prompt installation of firmware updates released by ASUS to address security vulnerabilities and enhance system protection.