Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33554: n/a

0
High
VulnerabilityCVE-2026-33554cvecve-2026-33554
Published: Tue Mar 24 2026 (03/24/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: "ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers," "ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers," and "ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers."

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 15:06:00 UTC

Technical Analysis

The vulnerability identified as CVE-2026-33554 resides in the ipmi-oem client command of FreeIPMI software versions prior to 1.16.17. FreeIPMI is an open-source implementation of the Intelligent Platform Management Interface (IPMI) protocol, widely used for hardware platform management tasks such as sensor monitoring and remote power control. The ipmi-oem command supports OEM-specific extensions for hardware vendors, allowing retrieval of vendor-specific information. This vulnerability involves exploitable buffer overflows in the handling of response messages for three subcommands: 'ipmi-oem dell get-last-post-code', 'ipmi-oem supermicro extra-firmware-info', and 'ipmi-oem wistron read-proprietary-string'. These subcommands query proprietary data from Dell, Supermicro, and Wistron servers respectively. A buffer overflow occurs when the response message exceeds the allocated buffer size, potentially allowing an attacker to overwrite memory, leading to arbitrary code execution or denial of service. The flaw arises from insufficient bounds checking on the response data. Exploitation requires sending crafted responses to the ipmi-oem client, which may be feasible in environments where an attacker can intercept or manipulate IPMI traffic or responses. The vulnerability affects a broad range of hardware platforms that utilize FreeIPMI for IPMI management, especially those from the three mentioned OEMs. No CVSS score has been assigned yet, and no exploits are currently known in the wild. The issue was publicly disclosed on March 24, 2026, and FreeIPMI 1.16.17 includes fixes to address these buffer overflows.

Potential Impact

This vulnerability poses a significant risk to organizations relying on FreeIPMI for IPMI management on Dell, Supermicro, and Wistron hardware. Successful exploitation could allow attackers to execute arbitrary code with the privileges of the ipmi-oem client, potentially leading to full system compromise or denial of service. Given IPMI's role in out-of-band management, attackers might bypass traditional network security controls to manipulate hardware-level functions such as power cycling or sensor data, impacting system availability and integrity. The vulnerability could be leveraged in targeted attacks against data centers, cloud providers, and enterprises using affected hardware, especially where IPMI interfaces are exposed or insufficiently protected. The absence of authentication requirements or user interaction for exploitation increases the threat level. Although no known exploits exist yet, the widespread use of affected hardware and FreeIPMI software means the attack surface is substantial. The impact extends to critical infrastructure and sectors dependent on reliable server management, including finance, healthcare, and government.

Mitigation Recommendations

Organizations should immediately upgrade FreeIPMI to version 1.16.17 or later, which contains patches for the buffer overflow vulnerabilities. Network segmentation and strict access controls should be enforced to restrict IPMI interface access only to trusted management networks and personnel. Employing IPMI over secure channels such as VPNs or dedicated management VLANs reduces exposure to interception or manipulation of IPMI traffic. Monitoring and logging IPMI activity can help detect anomalous or unauthorized commands. Vendors and administrators should audit their environments for use of the vulnerable ipmi-oem subcommands and disable or restrict their usage if not required. Additionally, firmware updates from Dell, Supermicro, and Wistron should be reviewed and applied as recommended to complement software mitigations. Implementing intrusion detection systems capable of recognizing malformed IPMI traffic may provide early warning of exploitation attempts. Finally, organizations should develop incident response plans specific to IPMI-related compromises to minimize impact if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-03-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c2a3a3f4197a8e3b3ed950

Added to database: 3/24/2026, 2:45:55 PM

Last enriched: 3/24/2026, 3:06:00 PM

Last updated: 3/26/2026, 4:29:51 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses