DSA-2024-099: Security Update for Dell iDRAC9 IPMI Session Vulnerability
Summary:Dell iDRAC9 mitigation is available for predictable Intelligent Platform Management Interface (IPMI) 2.0 session IDs that malicious users may exploit to compromise the affected system.
Please select a product to check article relevancy
This article applies to This article does not apply toThis article is not tied to any specific product.Not all product versions are identified in this article.
iDRAC9, versions prior to 7.00.00.172 for 14th Generation and 7.10.50.00 for 15th and 16th Generations, contains a session hijacking vulnerability in IPMI. A remote attacker could potentially exploit this vulnerability, leading to arbitrary code execution on the vulnerable application.
iDRAC9, versions prior to 7.00.00.172 for 14th Generation and 7.10.50.00 for 15th and 16th Generations, contains a session hijacking vulnerability in IPMI. A remote attacker could potentially exploit this vulnerability, leading to arbitrary code execution on the vulnerable application.
Dell Technologies recommends all customers consider both the CVSS base score and any relevant temporal and environmental scores that may impact the potential severity associated with a particular security vulnerability.
For iDRAC9 mitigation, disable IPMI over LAN. IPMI is disabled by default, but if required it can be disabled in the iDRAC web interface by going to iDRAC Settings -> Connectivity -> Network -> IPMI Settings.