Home Security Eclypsium demonstrates the remote bricking of a server

Firmware and hardware security firm Eclypsium (recently funded by Andreessen Horowitz and others) has released new findings, demonstrating that BMC (baseboard management controllers) vulnerabilities can actually be exploited to "brick" servers, rendering entire data centres and cloud applications completely useless.

The implications of this are huge. Nearly any server in almost any data centre is vulnerable.

This can be done remotely, making the servers completely unfunctional and unrecoverable, and affects a majority of BMCs in the industry.

A (deliberately vague) video demonstrates the hack. This is a new class of attack – one that causes permanent damage to a system.

Eclypsium's representatives made the following points during a conversation with iTWire:

  • Bricking has never been demonstrated.
  • BMC is used to recover a server when system firmware is corrupted.
  • An attacker can bypass BMC network isolation by infecting BMC through the host.

An Eclypsium representative said: "Let's explain what happens in the video. In order to manage assets at scale, servers include a baseboard management controller. You can think of this BMC as an independent computer that lives within a server.

"It can seem like an odd concept, but this independent BMC is used to remotely configure the system without relying on the host operating system or applications. It can be used to remotely manage the server, reinstall the operating system, and even update the host system firmware.

"There are multiple ways of communicating with the BMC. Commonly, due to the nature of its role in remote management, we think about network-based methods like using the Web interface or the network capabilities of the Intelligent Platform Management Interface protocol where attacks have been published previously.

"However, there is also a host-based interface known as the Keyboard Controller Style, which is defined as part of the IPMI specification. Among other things, this creates a mechanism for firmware updates to be passed back and forth between the host and the BMC.

"In our demonstration, we use normal update tools to pass a malicious firmware image to the BMC over this interface. No special authentication or credentials are required for this.

"This malicious BMC firmware update contains additional code that, once triggered, will erase the UEFI system firmware and critical components of the BMC firmware itself.

"These changes to the host and BMC will cause all attempts to boot or recover the system to fail, rendering it unusable. These firmware images cause all attempts to boot or recover the system to fail, rendering it unusable.

"This could enable an incredibly damaging attack scenario. With something as simple as a malware infection or compromising an administrator, an administrator could irrecoverably brick the hardware of a data centre. Such an attack could also be easily scheduled to execute at a specific time.

"They can be implemented as a kill-switch feature in the malicious software, firmware, or hardware components. They can be introduced either physically or remotely, as part of the supply chain, or in operations. And they can stay dormant for arbitrary amounts of time and bring down infrastructure all at once."

Eclypsium provided this infographic:

bricking infographic small

The only way to recover is to open every server and physically connect to the BMC chip to deliver new firmware. This is something that is really not feasible in any significant data centre.

This attack can be performed at scale; unfortunately, the recovery is not at scale – it can only be performed one server at a time, with physical intervention.

This attack has not yet been seen in the wild.

REASON TO CHOOSE TENDA MESH WIFI

Our Mesh WiFi system MW3 is the first in Australia market with price below AUD$200 for a set of three.

· Best valued product
· Strong signal covering up to 300m2 for MW3 and 500m2 for MW6
· Aesthetically pleasing and light weigh (blend into any room deco)
· Wireline backhauls supported
· Product units are pre-paired and easy to setup
· Not requiring phone number or email address to set up
· Wall penetration (better than other similar brands)
· Seamless WiFi roaming
· User friendly app with controls to setup a guest network, parental controls for disabling groups of devices you allocate to individuals, QoS and more

CLICK FOR MORE INFO!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect