CVE-2021-26733: CWE-284 Improper Access Control in Lanner Inc IAC-AST2500A
A broken access control vulnerability in the FirstReset_handler_func function of spx_restservice allows an attacker to arbitrarily send reboot commands to the BMC, causing a Denial-of-Service (DoS) condition. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
AI Analysis
Technical Summary
CVE-2021-26733 is a medium severity vulnerability classified under CWE-284 (Improper Access Control) affecting the Lanner Inc IAC-AST2500A device running standard firmware version 1.10.0. The vulnerability resides in the FirstReset_handler_func function of the spx_restservice component. Due to broken access control, an unauthenticated attacker can send arbitrary reboot commands to the Baseboard Management Controller (BMC) remotely over the network. This results in a Denial-of-Service (DoS) condition by repeatedly forcing the BMC to reboot, potentially disrupting management and monitoring capabilities of the affected device. The CVSS v3.1 score is 5.3, reflecting a network attack vector with low complexity and no privileges or user interaction required, but limited to availability impact only (no confidentiality or integrity impact). No known exploits are currently reported in the wild, and no patches have been linked in the provided data. The BMC is a critical component for out-of-band management in enterprise and industrial environments, so disruption can affect system availability and operational continuity.
Potential Impact
For European organizations, the impact of this vulnerability can be significant in sectors relying on Lanner IAC-AST2500A devices for infrastructure management, such as telecommunications, industrial automation, and data centers. A successful exploitation would cause repeated BMC reboots, leading to temporary loss of remote management capabilities and potential downtime. This can delay incident response, complicate system maintenance, and increase operational risk. Although the vulnerability does not compromise confidentiality or integrity, the availability impact can disrupt critical services and increase operational costs. Organizations with strict uptime requirements or those operating critical infrastructure could face compliance and service level agreement (SLA) challenges. The lack of authentication requirement increases the risk of exploitation from remote attackers scanning for vulnerable devices.
Mitigation Recommendations
1. Immediate mitigation should include network-level controls such as restricting access to the BMC management interface to trusted IP addresses or VPNs only, effectively reducing the attack surface. 2. Implement network segmentation to isolate BMC management traffic from general user networks. 3. Monitor network traffic for unusual reboot commands or repeated BMC reboots to detect potential exploitation attempts early. 4. Engage with Lanner Inc to obtain firmware updates or patches addressing this vulnerability; if unavailable, consider vendor support escalation or alternative management solutions. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tailored to detect unauthorized BMC commands. 6. Regularly audit and review access control policies on management interfaces to ensure no unauthorized access is possible. 7. Maintain an incident response plan that includes procedures for BMC-related disruptions to minimize downtime.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2021-26733: CWE-284 Improper Access Control in Lanner Inc IAC-AST2500A
Description
A broken access control vulnerability in the FirstReset_handler_func function of spx_restservice allows an attacker to arbitrarily send reboot commands to the BMC, causing a Denial-of-Service (DoS) condition. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.
AI-Powered Analysis
Technical Analysis
CVE-2021-26733 is a medium severity vulnerability classified under CWE-284 (Improper Access Control) affecting the Lanner Inc IAC-AST2500A device running standard firmware version 1.10.0. The vulnerability resides in the FirstReset_handler_func function of the spx_restservice component. Due to broken access control, an unauthenticated attacker can send arbitrary reboot commands to the Baseboard Management Controller (BMC) remotely over the network. This results in a Denial-of-Service (DoS) condition by repeatedly forcing the BMC to reboot, potentially disrupting management and monitoring capabilities of the affected device. The CVSS v3.1 score is 5.3, reflecting a network attack vector with low complexity and no privileges or user interaction required, but limited to availability impact only (no confidentiality or integrity impact). No known exploits are currently reported in the wild, and no patches have been linked in the provided data. The BMC is a critical component for out-of-band management in enterprise and industrial environments, so disruption can affect system availability and operational continuity.
Potential Impact
For European organizations, the impact of this vulnerability can be significant in sectors relying on Lanner IAC-AST2500A devices for infrastructure management, such as telecommunications, industrial automation, and data centers. A successful exploitation would cause repeated BMC reboots, leading to temporary loss of remote management capabilities and potential downtime. This can delay incident response, complicate system maintenance, and increase operational risk. Although the vulnerability does not compromise confidentiality or integrity, the availability impact can disrupt critical services and increase operational costs. Organizations with strict uptime requirements or those operating critical infrastructure could face compliance and service level agreement (SLA) challenges. The lack of authentication requirement increases the risk of exploitation from remote attackers scanning for vulnerable devices.
Mitigation Recommendations
1. Immediate mitigation should include network-level controls such as restricting access to the BMC management interface to trusted IP addresses or VPNs only, effectively reducing the attack surface. 2. Implement network segmentation to isolate BMC management traffic from general user networks. 3. Monitor network traffic for unusual reboot commands or repeated BMC reboots to detect potential exploitation attempts early. 4. Engage with Lanner Inc to obtain firmware updates or patches addressing this vulnerability; if unavailable, consider vendor support escalation or alternative management solutions. 5. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tailored to detect unauthorized BMC commands. 6. Regularly audit and review access control policies on management interfaces to ensure no unauthorized access is possible. 7. Maintain an incident response plan that includes procedures for BMC-related disruptions to minimize downtime.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Nozomi
- Date Reserved
- 2021-02-05T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ac4522896dcbd96fb
Added to database: 5/21/2025, 9:08:42 AM
Last enriched: 7/5/2025, 1:10:52 PM
Last updated: 8/11/2025, 11:51:17 PM
Views: 14
Related Threats
CVE-2025-8947: SQL Injection in projectworlds Visitor Management System
MediumCVE-2025-8046: CWE-79 Cross-Site Scripting (XSS) in Injection Guard
MediumCVE-2025-7808: CWE-79 Cross-Site Scripting (XSS) in WP Shopify
HighCVE-2025-6790: CWE-352 Cross-Site Request Forgery (CSRF) in Quiz and Survey Master (QSM)
HighCVE-2025-3414: CWE-79 Cross-Site Scripting (XSS) in Structured Content (JSON-LD) #wpsc
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.