Skip to main content

CVE-2021-45925: CWE-203 Information Exposure Through Discrepancy in Lanner Inc IAC-AST2500A

Medium
VulnerabilityCVE-2021-45925cvecve-2021-45925cwe-203
Published: Mon Oct 24 2022 (10/24/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Lanner Inc
Product: IAC-AST2500A

Description

Observable discrepancies in the login process allow an attacker to guess legitimate user names registered in the BMC. This issue affects: Lanner Inc IAC-AST2500A standard firmware version 1.10.0.

AI-Powered Analysis

AILast updated: 07/05/2025, 14:41:00 UTC

Technical Analysis

CVE-2021-45925 is a medium-severity vulnerability classified under CWE-203 (Information Exposure Through Discrepancy) affecting the Lanner Inc IAC-AST2500A device running standard firmware version 1.10.0. The vulnerability arises from observable discrepancies during the login process of the Baseboard Management Controller (BMC) interface. Specifically, these discrepancies allow an unauthenticated attacker to infer or guess legitimate usernames registered on the BMC by analyzing differences in system responses or timing during login attempts. This form of information exposure does not directly compromise password or other sensitive data but leaks valid usernames, which can be leveraged in subsequent targeted attacks such as brute force password guessing, credential stuffing, or social engineering. The vulnerability requires no privileges and no user interaction, and the attack can be performed remotely over the network (AV:N). The CVSS 3.1 score is 5.3, reflecting a medium severity primarily due to the confidentiality impact (partial information disclosure) without integrity or availability impact. There are no known exploits in the wild, and no patches or mitigations are explicitly linked in the provided data, indicating that affected organizations need to proactively address this issue. The vulnerability is specific to firmware version 1.10.0 of the IAC-AST2500A, a device commonly used for industrial or enterprise-grade management of hardware systems via BMC interfaces.

Potential Impact

For European organizations, the exposure of valid usernames on BMC devices can significantly increase the risk of targeted cyberattacks against critical infrastructure and enterprise IT environments. BMCs are often used in data centers, industrial control systems, and network equipment to manage hardware remotely. Knowledge of valid usernames enables attackers to focus brute force or credential stuffing attacks, potentially leading to unauthorized access if weak or reused passwords are present. This can compromise the confidentiality of management interfaces, potentially leading to further lateral movement, data exfiltration, or disruption of services. Given the strategic importance of industrial and enterprise infrastructure in Europe, especially in sectors like manufacturing, energy, and telecommunications, this vulnerability could be exploited to gain footholds in critical systems. While the vulnerability itself does not allow direct control or denial of service, it lowers the barrier for attackers to escalate privileges or compromise systems. The lack of known exploits suggests limited current risk, but the presence of this vulnerability in widely deployed firmware means organizations should not ignore it.

Mitigation Recommendations

1. Immediate mitigation should include restricting network access to the BMC interface to trusted management networks only, using network segmentation and firewall rules to limit exposure. 2. Implement strong password policies and enforce multi-factor authentication (MFA) on BMC logins where supported to reduce the risk of credential compromise. 3. Monitor login attempts and implement account lockout policies to detect and prevent brute force attacks leveraging enumerated usernames. 4. Regularly audit and update firmware to the latest versions provided by Lanner Inc, as vendors typically release patches or mitigations for such vulnerabilities. If no patch is available, consider disabling or isolating vulnerable BMC interfaces until a fix is released. 5. Employ intrusion detection systems (IDS) or security information and event management (SIEM) tools to detect anomalous login patterns indicative of username enumeration attempts. 6. Educate IT and security teams about the risks of username enumeration and the importance of securing management interfaces. These steps go beyond generic advice by focusing on network-level controls, authentication hardening, and active monitoring specific to BMC environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Nozomi
Date Reserved
2022-05-13T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9a71

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 7/5/2025, 2:41:00 PM

Last updated: 8/5/2025, 6:46:52 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats