Skip to main content

CVE-2024-20906: Easily exploitable vulnerability allows high privileged attacker with network access via ICMP to compromise Integrated Lights Out Manager (ILOM). Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Integrated Lights Out Manager (ILOM), attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Integrated Lights Out Manager (ILOM) accessible data as well as unauthorized read access to a subset of Integrated Lights Out Manager (ILOM) accessible data. in Oracle Corporation SSM - (hot-tamale) ILOM: Integrated Lights Out Manager

Medium
VulnerabilityCVE-2024-20906cvecve-2024-20906
Published: Tue Jan 16 2024 (01/16/2024, 21:41:12 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: SSM - (hot-tamale) ILOM: Integrated Lights Out Manager

Description

Vulnerability in the Integrated Lights Out Manager (ILOM) product of Oracle Systems (component: System Management). Supported versions that are affected are 3, 4 and 5. Easily exploitable vulnerability allows high privileged attacker with network access via ICMP to compromise Integrated Lights Out Manager (ILOM). Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Integrated Lights Out Manager (ILOM), attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Integrated Lights Out Manager (ILOM) accessible data as well as unauthorized read access to a subset of Integrated Lights Out Manager (ILOM) accessible data. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N).

AI-Powered Analysis

AILast updated: 07/08/2025, 12:13:33 UTC

Technical Analysis

CVE-2024-20906 is a medium-severity vulnerability affecting Oracle's Integrated Lights Out Manager (ILOM) versions 3, 4, and 5, a system management component used for remote management of servers and hardware. The vulnerability allows a high-privileged attacker with network access via ICMP to compromise the ILOM system. Exploitation requires human interaction from a user other than the attacker, indicating a social engineering component or user-triggered action is necessary. The vulnerability impacts confidentiality and integrity, enabling unauthorized update, insertion, or deletion of some ILOM-accessible data, as well as unauthorized read access to a subset of that data. The scope of impact extends beyond ILOM itself, potentially affecting additional products managed or integrated with ILOM, indicating a scope change in the CVSS vector. The CVSS 3.1 base score is 4.8, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), high privileges required (PR:H), user interaction required (UI:R), scope changed (S:C), low confidentiality and integrity impact (C:L, I:L), and no availability impact (A:N). No known exploits are currently reported in the wild, and no patches are linked in the provided data, suggesting that mitigation may rely on vendor updates or configuration changes once available. The vulnerability's reliance on ICMP as an attack vector is notable, as ICMP is often allowed through firewalls for network diagnostics, potentially increasing exposure. The requirement for high privileges and user interaction somewhat limits the ease of exploitation but does not eliminate risk, especially in environments where privileged users may be targeted via phishing or other social engineering techniques. Given ILOM's role in critical infrastructure management, unauthorized modification or disclosure of management data could lead to broader system compromise or disruption.

Potential Impact

For European organizations, the impact of CVE-2024-20906 can be significant, especially for enterprises and data centers relying on Oracle hardware managed via ILOM. Unauthorized access to management data could lead to manipulation of server configurations, unauthorized firmware updates, or insertion of malicious configurations, potentially undermining system integrity and security. Confidentiality breaches could expose sensitive operational data, while integrity violations could disrupt service availability indirectly by corrupting management functions. Given the scope change, other integrated products could be affected, amplifying the risk. Industries with high reliance on Oracle hardware, such as finance, telecommunications, government, and critical infrastructure sectors, may face increased risk. The requirement for user interaction means phishing or social engineering attacks targeting privileged users are a likely exploitation path, emphasizing the need for strong user awareness and access controls. The use of ICMP as an attack vector may bypass some traditional network defenses, increasing exposure if ICMP traffic is not properly monitored or restricted. Overall, the vulnerability could facilitate lateral movement within networks and persistent compromise of critical management infrastructure, posing a threat to operational continuity and data security in European organizations.

Mitigation Recommendations

1. Restrict ICMP traffic: Implement strict network controls to limit ICMP traffic to only trusted sources and management networks, reducing exposure to network-based attacks leveraging ICMP. 2. Privilege minimization: Enforce the principle of least privilege for all users with access to ILOM, ensuring that only necessary personnel have high-level privileges. 3. User interaction safeguards: Enhance user training and awareness programs focused on social engineering and phishing risks, particularly targeting privileged users who can interact with ILOM. 4. Network segmentation: Isolate ILOM management interfaces on dedicated management VLANs or networks with strict access controls to prevent unauthorized lateral movement. 5. Monitoring and logging: Enable detailed logging and continuous monitoring of ILOM access and changes to detect suspicious activities promptly. 6. Vendor updates: Monitor Oracle security advisories closely and apply patches or updates as soon as they become available to address this vulnerability. 7. Multi-factor authentication (MFA): If supported, enforce MFA for access to ILOM interfaces to reduce the risk of credential compromise leading to exploitation. 8. Incident response readiness: Prepare incident response plans specifically addressing potential ILOM compromise scenarios to enable rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2023-12-07T22:28:10.616Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6843500671f4d251b5de40b5

Added to database: 6/6/2025, 8:31:02 PM

Last enriched: 7/8/2025, 12:13:33 PM

Last updated: 8/5/2025, 10:39:06 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats