CVE-2021-26733: CWE-284 Improper Access Control in Lanner Inc IAC-AST2500A
A broken access control vulnerability in the FirstReset_handler_func function of spx_restservice allows an attacker to arbitrarily send reboot commands to the BMC, causing a Denial-of-Service (DoS) condition. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
AI Analysis
Technical Summary
CVE-2021-26733 is a medium severity vulnerability classified under CWE-284 (Improper Access Control) affecting the Lanner Inc IAC-AST2500A device running standard firmware version 1.10.0. The vulnerability resides in the FirstReset_handler_func function of the spx_restservice component. Due to broken access control, an unauthenticated attacker can send arbitrary reboot commands to the Baseboard Management Controller (BMC) remotely over the network. This results in a Denial-of-Service (DoS) condition by repeatedly forcing the BMC to reboot, potentially disrupting management and monitoring capabilities of the affected device. The CVSS v3.1 score is 5.3, reflecting a network attack vector with low complexity and no privileges or user interaction required, but limited to availability impact only (no confidentiality or integrity impact). No known exploits are currently reported in the wild, and no patches have been linked in the provided data. The BMC is a critical component for out-of-band management in enterprise and industrial environments, so disruption can affect system availability and operational continuity.
Potential Impact
For European organizations, the impact of this vulnerability can be significant in sectors relying on Lanner IAC-AST2500A devices for infrastructure management, such as telecommunications, industrial automation, and data centers. A successful exploitation would cause repeated BMC reboots, leading to temporary loss of remote management capabilities and potential downtime. This can delay incident response, complicate system maintenance, and increase operational risk. Although the vulnerability does not compromise confidentiality or integrity, the availability impact can disrupt critical services and increase operational costs. Organizations with strict uptime requirements or those operating critical infrastructure could face compliance and service level agreement (SLA) challenges. The lack of authentication requirement increases the risk of exploitation from remote attackers scanning for vulnerable devices.
Mitigation Recommendations
1. Immediate mitigation should include network-level controls such as restricting access to the BMC management interface to trusted IP addresses or VPNs only, effectively reducing the attack surface. 2. Implement network segmentation to isolate BMC management traffic from general user networks. 3. Monitor network traffic for unusual reboot commands or repeated BMC reboots to detect potential exploitation attempts early. 4. Engage with Lanner Inc to obtain firmware updates or patches addressing this vulnerability; if unavailable, consider vendor support escalation or alternative management solutions. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tailored to detect unauthorized BMC commands. 6. Regularly audit and review access control policies on management interfaces to ensure no unauthorized access is possible. 7. Maintain an incident response plan that includes procedures for BMC-related disruptions to minimize downtime.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2021-26733: CWE-284 Improper Access Control in Lanner Inc IAC-AST2500A
Description
A broken access control vulnerability in the FirstReset_handler_func function of spx_restservice allows an attacker to arbitrarily send reboot commands to the BMC, causing a Denial-of-Service (DoS) condition. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
AI-Powered Analysis
Technical Analysis
CVE-2021-26733 is a medium severity vulnerability classified under CWE-284 (Improper Access Control) affecting the Lanner Inc IAC-AST2500A device running standard firmware version 1.10.0. The vulnerability resides in the FirstReset_handler_func function of the spx_restservice component. Due to broken access control, an unauthenticated attacker can send arbitrary reboot commands to the Baseboard Management Controller (BMC) remotely over the network. This results in a Denial-of-Service (DoS) condition by repeatedly forcing the BMC to reboot, potentially disrupting management and monitoring capabilities of the affected device. The CVSS v3.1 score is 5.3, reflecting a network attack vector with low complexity and no privileges or user interaction required, but limited to availability impact only (no confidentiality or integrity impact). No known exploits are currently reported in the wild, and no patches have been linked in the provided data. The BMC is a critical component for out-of-band management in enterprise and industrial environments, so disruption can affect system availability and operational continuity.
Potential Impact
For European organizations, the impact of this vulnerability can be significant in sectors relying on Lanner IAC-AST2500A devices for infrastructure management, such as telecommunications, industrial automation, and data centers. A successful exploitation would cause repeated BMC reboots, leading to temporary loss of remote management capabilities and potential downtime. This can delay incident response, complicate system maintenance, and increase operational risk. Although the vulnerability does not compromise confidentiality or integrity, the availability impact can disrupt critical services and increase operational costs. Organizations with strict uptime requirements or those operating critical infrastructure could face compliance and service level agreement (SLA) challenges. The lack of authentication requirement increases the risk of exploitation from remote attackers scanning for vulnerable devices.
Mitigation Recommendations
1. Immediate mitigation should include network-level controls such as restricting access to the BMC management interface to trusted IP addresses or VPNs only, effectively reducing the attack surface. 2. Implement network segmentation to isolate BMC management traffic from general user networks. 3. Monitor network traffic for unusual reboot commands or repeated BMC reboots to detect potential exploitation attempts early. 4. Engage with Lanner Inc to obtain firmware updates or patches addressing this vulnerability; if unavailable, consider vendor support escalation or alternative management solutions. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tailored to detect unauthorized BMC commands. 6. Regularly audit and review access control policies on management interfaces to ensure no unauthorized access is possible. 7. Maintain an incident response plan that includes procedures for BMC-related disruptions to minimize downtime.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Nozomi
- Date Reserved
- 2021-02-05T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ac4522896dcbd96fb
Added to database: 5/21/2025, 9:08:42 AM
Last enriched: 7/5/2025, 1:10:52 PM
Last updated: 2/7/2026, 11:23:44 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.