Skip to main content

CVE-2021-26733: CWE-284 Improper Access Control in Lanner Inc IAC-AST2500A

Medium
VulnerabilityCVE-2021-26733cvecve-2021-26733cwe-284
Published: Mon Oct 24 2022 (10/24/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Lanner Inc
Product: IAC-AST2500A

Description

A broken access control vulnerability in the FirstReset_handler_func function of spx_restservice allows an attacker to arbitrarily send reboot commands to the BMC, causing a Denial-of-Service (DoS) condition. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.

AI-Powered Analysis

AILast updated: 07/05/2025, 13:10:52 UTC

Technical Analysis

CVE-2021-26733 is a medium severity vulnerability classified under CWE-284 (Improper Access Control) affecting the Lanner Inc IAC-AST2500A device running standard firmware version 1.10.0. The vulnerability resides in the FirstReset_handler_func function of the spx_restservice component. Due to broken access control, an unauthenticated attacker can send arbitrary reboot commands to the Baseboard Management Controller (BMC) remotely over the network. This results in a Denial-of-Service (DoS) condition by repeatedly forcing the BMC to reboot, potentially disrupting management and monitoring capabilities of the affected device. The CVSS v3.1 score is 5.3, reflecting a network attack vector with low complexity and no privileges or user interaction required, but limited to availability impact only (no confidentiality or integrity impact). No known exploits are currently reported in the wild, and no patches have been linked in the provided data. The BMC is a critical component for out-of-band management in enterprise and industrial environments, so disruption can affect system availability and operational continuity.

Potential Impact

For European organizations, the impact of this vulnerability can be significant in sectors relying on Lanner IAC-AST2500A devices for infrastructure management, such as telecommunications, industrial automation, and data centers. A successful exploitation would cause repeated BMC reboots, leading to temporary loss of remote management capabilities and potential downtime. This can delay incident response, complicate system maintenance, and increase operational risk. Although the vulnerability does not compromise confidentiality or integrity, the availability impact can disrupt critical services and increase operational costs. Organizations with strict uptime requirements or those operating critical infrastructure could face compliance and service level agreement (SLA) challenges. The lack of authentication requirement increases the risk of exploitation from remote attackers scanning for vulnerable devices.

Mitigation Recommendations

1. Immediate mitigation should include network-level controls such as restricting access to the BMC management interface to trusted IP addresses or VPNs only, effectively reducing the attack surface. 2. Implement network segmentation to isolate BMC management traffic from general user networks. 3. Monitor network traffic for unusual reboot commands or repeated BMC reboots to detect potential exploitation attempts early. 4. Engage with Lanner Inc to obtain firmware updates or patches addressing this vulnerability; if unavailable, consider vendor support escalation or alternative management solutions. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tailored to detect unauthorized BMC commands. 6. Regularly audit and review access control policies on management interfaces to ensure no unauthorized access is possible. 7. Maintain an incident response plan that includes procedures for BMC-related disruptions to minimize downtime.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Nozomi
Date Reserved
2021-02-05T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ac4522896dcbd96fb

Added to database: 5/21/2025, 9:08:42 AM

Last enriched: 7/5/2025, 1:10:52 PM

Last updated: 8/11/2025, 11:51:17 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats