Security Market Segment LS
Thursday, 20 December 2018 00:10

Eclypsium demonstrates the remote bricking of a server


Firmware and hardware security firm Eclypsium (recently funded by Andreessen Horowitz and others) has released new findings, demonstrating that BMC (baseboard management controllers) vulnerabilities can actually be exploited to "brick" servers, rendering entire data centres and cloud applications completely useless.

The implications of this are huge. Nearly any server in almost any data centre is vulnerable.

This can be done remotely, making the servers completely unfunctional and unrecoverable, and affects a majority of BMCs in the industry.

A (deliberately vague) video demonstrates the hack. This is a new class of attack – one that causes permanent damage to a system.

Eclypsium's representatives made the following points during a conversation with iTWire:

  • Bricking has never been demonstrated.
  • BMC is used to recover a server when system firmware is corrupted.
  • An attacker can bypass BMC network isolation by infecting BMC through the host.

An Eclypsium representative said: "Let's explain what happens in the video. In order to manage assets at scale, servers include a baseboard management controller. You can think of this BMC as an independent computer that lives within a server.

"It can seem like an odd concept, but this independent BMC is used to remotely configure the system without relying on the host operating system or applications. It can be used to remotely manage the server, reinstall the operating system, and even update the host system firmware.

"There are multiple ways of communicating with the BMC. Commonly, due to the nature of its role in remote management, we think about network-based methods like using the Web interface or the network capabilities of the Intelligent Platform Management Interface protocol where attacks have been published previously.

"However, there is also a host-based interface known as the Keyboard Controller Style, which is defined as part of the IPMI specification. Among other things, this creates a mechanism for firmware updates to be passed back and forth between the host and the BMC.

"In our demonstration, we use normal update tools to pass a malicious firmware image to the BMC over this interface. No special authentication or credentials are required for this.

"This malicious BMC firmware update contains additional code that, once triggered, will erase the UEFI system firmware and critical components of the BMC firmware itself.

"These changes to the host and BMC will cause all attempts to boot or recover the system to fail, rendering it unusable. These firmware images cause all attempts to boot or recover the system to fail, rendering it unusable.

"This could enable an incredibly damaging attack scenario. With something as simple as a malware infection or compromising an administrator, an administrator could irrecoverably brick the hardware of a data centre. Such an attack could also be easily scheduled to execute at a specific time.

"They can be implemented as a kill-switch feature in the malicious software, firmware, or hardware components. They can be introduced either physically or remotely, as part of the supply chain, or in operations. And they can stay dormant for arbitrary amounts of time and bring down infrastructure all at once."

Eclypsium provided this infographic:

bricking infographic small

The only way to recover is to open every server and physically connect to the BMC chip to deliver new firmware. This is something that is really not feasible in any significant data centre.

This attack can be performed at scale; unfortunately, the recovery is not at scale – it can only be performed one server at a time, with physical intervention.

This attack has not yet been seen in the wild.


As part of our Lead Machine Methodology we will help you get more leads, more customers and more business. Let us help you develop your digital marketing campaign

Digital Marketing is ideal in these tough times and it can replace face to face marketing with person to person marketing via the phone conference calls and webinars

Significant opportunity pipelines can be developed and continually topped up with the help of Digital Marketing so that deals can be made and deals can be closed

- Newsletter adverts in dynamic GIF slideshow formats

- News site adverts from small to large sizes also as dynamic GIF slideshow formats

- Guest Editorial - get your message out there and put your CEO in the spotlight

- Promotional News and Content - displayed on the homepage and all pages

- Leverage our proven event promotion methodology - The Lead Machine gets you leads

Contact Andrew our digital campaign designer on 0412 390 000 or via email



Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.


David Heath

David Heath has had a long and varied career in the IT industry having worked as a Pre-sales Network Engineer (remember Novell NetWare?), General Manager of IT&T for the TV Shopping Network, as a Technical manager in the Biometrics industry, and as a Technical Trainer and Instructional Designer in the industrial control sector. In all aspects, security has been a driving focus. Throughout his career, David has sought to inform and educate people and has done that through his writings and in more formal educational environments.



Recent Comments