Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-26732: CWE-284 Improper Access Control in Lanner Inc IAC-AST2500A

0
Medium
VulnerabilityCVE-2021-26732cvecve-2021-26732cwe-284
Published: Mon Oct 24 2022 (10/24/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Lanner Inc
Product: IAC-AST2500A

Description

A broken access control vulnerability in the First_network_func function of spx_restservice allows an attacker to arbitrarily change the network configuration of the BMC. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.

AI-Powered Analysis

AILast updated: 07/05/2025, 13:10:40 UTC

Technical Analysis

CVE-2021-26732 is a medium-severity vulnerability classified under CWE-284 (Improper Access Control) affecting the Lanner Inc IAC-AST2500A device running standard firmware version 1.10.0. The vulnerability exists in the First_network_func function of the spx_restservice component, which is responsible for handling network configuration on the Baseboard Management Controller (BMC). Due to broken access control, an unauthenticated remote attacker can exploit this flaw to arbitrarily modify the network settings of the BMC. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting a network attack vector with low complexity, no privileges required, and no user interaction needed. The impact primarily affects the integrity and availability of the BMC network configuration, potentially allowing attackers to disrupt remote management capabilities or redirect management traffic. No known exploits are currently reported in the wild, and no official patches have been linked, indicating that mitigation may require vendor intervention or manual configuration changes. The BMC is a critical component for out-of-band management in enterprise-grade hardware, and unauthorized changes to its network configuration can lead to denial of management access, interception of management traffic, or further compromise of the management plane. This vulnerability highlights the importance of strict access controls on management interfaces, especially those exposed over the network without authentication requirements.

Potential Impact

For European organizations, the exploitation of this vulnerability could lead to significant operational disruptions, especially in sectors relying heavily on remote hardware management such as data centers, telecommunications, and critical infrastructure. Unauthorized modification of BMC network settings can result in loss of remote management capabilities, delaying incident response and recovery efforts. Additionally, attackers could reroute or intercept management traffic, potentially facilitating further attacks or data exfiltration. The integrity and availability of critical management functions are at risk, which can cascade into broader system outages or security breaches. Given the increasing reliance on remote management in distributed IT environments across Europe, this vulnerability poses a tangible risk to business continuity and security posture.

Mitigation Recommendations

1. Immediate mitigation should include restricting network access to the BMC interface by implementing network segmentation and firewall rules that limit access to trusted management networks only. 2. Disable or restrict the spx_restservice if it is not essential for operations, or configure it to require strong authentication mechanisms. 3. Monitor network traffic to and from the BMC for unusual configuration change attempts or unauthorized access patterns. 4. Engage with Lanner Inc to obtain firmware updates or patches addressing this vulnerability; if unavailable, consider alternative hardware or management solutions. 5. Implement multi-factor authentication and role-based access controls on all management interfaces to prevent unauthorized changes. 6. Regularly audit BMC configurations and logs to detect unauthorized modifications promptly. 7. Employ intrusion detection systems capable of identifying anomalous BMC network activity. These steps go beyond generic advice by focusing on network-level controls, service hardening, and proactive monitoring tailored to the specific nature of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Nozomi
Date Reserved
2021-02-05T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd96f7

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 1:10:40 PM

Last updated: 2/8/2026, 5:10:07 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats