Skip to main content

CVE-2021-26732: CWE-284 Improper Access Control in Lanner Inc IAC-AST2500A

Medium
VulnerabilityCVE-2021-26732cvecve-2021-26732cwe-284
Published: Mon Oct 24 2022 (10/24/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Lanner Inc
Product: IAC-AST2500A

Description

A broken access control vulnerability in the First_network_func function of spx_restservice allows an attacker to arbitrarily change the network configuration of the BMC. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.

AI-Powered Analysis

AILast updated: 07/05/2025, 13:10:40 UTC

Technical Analysis

CVE-2021-26732 is a medium-severity vulnerability classified under CWE-284 (Improper Access Control) affecting the Lanner Inc IAC-AST2500A device running standard firmware version 1.10.0. The vulnerability exists in the First_network_func function of the spx_restservice component, which is responsible for handling network configuration on the Baseboard Management Controller (BMC). Due to broken access control, an unauthenticated remote attacker can exploit this flaw to arbitrarily modify the network settings of the BMC. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting a network attack vector with low complexity, no privileges required, and no user interaction needed. The impact primarily affects the integrity and availability of the BMC network configuration, potentially allowing attackers to disrupt remote management capabilities or redirect management traffic. No known exploits are currently reported in the wild, and no official patches have been linked, indicating that mitigation may require vendor intervention or manual configuration changes. The BMC is a critical component for out-of-band management in enterprise-grade hardware, and unauthorized changes to its network configuration can lead to denial of management access, interception of management traffic, or further compromise of the management plane. This vulnerability highlights the importance of strict access controls on management interfaces, especially those exposed over the network without authentication requirements.

Potential Impact

For European organizations, the exploitation of this vulnerability could lead to significant operational disruptions, especially in sectors relying heavily on remote hardware management such as data centers, telecommunications, and critical infrastructure. Unauthorized modification of BMC network settings can result in loss of remote management capabilities, delaying incident response and recovery efforts. Additionally, attackers could reroute or intercept management traffic, potentially facilitating further attacks or data exfiltration. The integrity and availability of critical management functions are at risk, which can cascade into broader system outages or security breaches. Given the increasing reliance on remote management in distributed IT environments across Europe, this vulnerability poses a tangible risk to business continuity and security posture.

Mitigation Recommendations

1. Immediate mitigation should include restricting network access to the BMC interface by implementing network segmentation and firewall rules that limit access to trusted management networks only. 2. Disable or restrict the spx_restservice if it is not essential for operations, or configure it to require strong authentication mechanisms. 3. Monitor network traffic to and from the BMC for unusual configuration change attempts or unauthorized access patterns. 4. Engage with Lanner Inc to obtain firmware updates or patches addressing this vulnerability; if unavailable, consider alternative hardware or management solutions. 5. Implement multi-factor authentication and role-based access controls on all management interfaces to prevent unauthorized changes. 6. Regularly audit BMC configurations and logs to detect unauthorized modifications promptly. 7. Employ intrusion detection systems capable of identifying anomalous BMC network activity. These steps go beyond generic advice by focusing on network-level controls, service hardening, and proactive monitoring tailored to the specific nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Nozomi
Date Reserved
2021-02-05T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd96f7

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 1:10:40 PM

Last updated: 7/30/2025, 5:19:42 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats