Researchers at industrial cybersecurity firm Nozomi Networks have discovered more than a dozen vulnerabilities in baseboard management controller (BMC) firmware.
BMC is a specialized processor that allows administrators to remotely control and monitor a device without having to access the operating system or applications running on it. The BMC can be used to reboot a device, install an operating system, update the firmware, monitor system parameters, and analyze logs.
Many BMC vulnerabilities have been found in the past years, with researchers warning that exploitation of these flaws can allow a remote attacker to compromise and even damage the targeted server.
However, much of the research has focused on IT servers. Nozomi Networks’ research targeted a BMC that is used for operational technology (OT) and IoT devices.
Nozomi has analyzed IAC-AST2500A, an expansion card that enables BMC functionality on network appliances made by Lanner, a Taiwan-based company that specializes in the design and manufacturing of network appliances and rugged applied computing platforms.
The firmware running on the affected card is based on BMC remote management firmware from AMI, which is used by tech giants such as Asus, Dell, HP, Lenovo, Gigabyte and Nvidia.
The Lanner expansion card comes with a web application that allows users to take full control of the host, as well as the BMC itself. An analysis of this web interface by Nozomi researchers led to the discovery of 13 vulnerabilities, including five critical security holes that can be exploited for arbitrary code execution.
Nozomi has detailed how two of the 13 vulnerabilities, a medium-severity broken access control issue and a critical-severity command injection flaw, could be chained by an unauthenticated attacker to achieve remote code execution with root privileges on the BMC.
The cybersecurity firm said Lanner has created patches that should address the 13 vulnerabilities, but noted that it discovered other flaws as well during its analysis and those are still in the process of being fixed.
Related: QCT Servers Affected by ‘Pantsdown’ BMC Vulnerability
Related: BMC Firmware Vulnerabilities Affect Lenovo, Gigabyte Servers
Related: NVIDIA Patches AMI BMC Vulnerabilities Impacting Several Major Vendors

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- FDA Announces New Cybersecurity Requirements for Medical Devices
- Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
- Unpatched Security Flaws Expose Water Pump Controllers to Remote Hacker Attacks
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
- Google Links More iOS, Android Zero-Day Exploits to Spyware Vendors
- ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
Latest News
- Italy Temporarily Blocks ChatGPT Over Privacy Concerns
- FDA Announces New Cybersecurity Requirements for Medical Devices
- Report: Chinese State-Sponsored Hacking Group Highly Active
- Votiro Raises $11.5 Million to Prevent File-Borne Threats
- Lumen Technologies Hit by Two Cyberattacks
- Leaked Documents Detail Russia’s Cyberwarfare Tools, Including for OT Attacks
- Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
- Severe Azure Vulnerability Led to Unauthenticated Remote Code Execution
