Implementations of IPMI Authenticated sessions does not provide enough randomness to protect from session hijacking, allowing an attacker to use either predictable IPMI Session ID or weak BMC Random Number to bypass security controls using spoofed IPMI packets to manage BMC device.
References
Configurations
No configuration.
History
05 Feb 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-331 |
Information
Published : 2024-04-30 19:15
Updated : 2025-02-05 22:15
NVD link : CVE-2024-3411
Mitre link : CVE-2024-3411
CVE.ORG link : CVE-2024-3411
JSON object : View
Products Affected
No product.
CWE
CWE-331
Insufficient Entropy