Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33554: n/a

0
High
VulnerabilityCVE-2026-33554cvecve-2026-33554
Published: Tue Mar 24 2026 (03/24/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2026-33554 is a high-severity vulnerability in FreeIPMI's ipmi-oem client prior to version 1. 16. 17, involving exploitable buffer overflows in response messages for specific OEM commands. The affected commands target Dell, Supermicro, and Wistron servers, allowing attackers to potentially cause denial of service or crash the IPMI management interface. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. While it does not impact confidentiality or integrity directly, it severely affects availability of IPMI services. No known exploits are currently reported in the wild. Organizations using FreeIPMI with affected hardware should prioritize patching or mitigating exposure to IPMI interfaces. Countries with significant use of Dell, Supermicro, and Wistron server hardware are at higher risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 20:35:52 UTC

Technical Analysis

CVE-2026-33554 is a buffer overflow vulnerability found in the ipmi-oem client component of FreeIPMI versions before 1.16.17. FreeIPMI is an open-source implementation of the Intelligent Platform Management Interface (IPMI), widely used for out-of-band management tasks such as sensor monitoring and remote power control. The ipmi-oem client supports vendor-specific OEM commands for hardware management. This vulnerability affects three specific subcommands: 'ipmi-oem dell get-last-post-code', 'ipmi-oem supermicro extra-firmware-info', and 'ipmi-oem wistron read-proprietary-string'. These commands process response messages from the server, and due to improper bounds checking, an attacker can send crafted responses that trigger buffer overflows. Exploitation can lead to denial of service by crashing the IPMI management interface or potentially executing arbitrary code, although no integrity or confidentiality impacts are documented. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, unchanged scope, no confidentiality or integrity impact, but high availability impact. No patches or exploits are currently publicly available, but the risk remains significant given the critical role of IPMI in server management.

Potential Impact

The primary impact of CVE-2026-33554 is on the availability of IPMI services used for remote management of servers. Successful exploitation can cause buffer overflows that crash the IPMI interface, leading to denial of service conditions. This can disrupt critical management functions such as sensor monitoring, hardware health checks, and remote power control, potentially delaying incident response and maintenance operations. While the vulnerability does not directly compromise confidentiality or integrity, the loss of availability in management interfaces can indirectly increase risk by limiting administrators' ability to detect or respond to other threats. Organizations relying heavily on IPMI for server management, especially those using Dell, Supermicro, or Wistron hardware, may experience operational disruptions. The lack of authentication or user interaction requirements means attackers can exploit this vulnerability remotely with relative ease, increasing the threat surface. Given the widespread use of affected hardware in data centers, cloud providers, and enterprise environments, the impact could be significant if exploited at scale.

Mitigation Recommendations

To mitigate CVE-2026-33554, organizations should first verify if they use FreeIPMI versions prior to 1.16.17 and identify affected hardware models from Dell, Supermicro, and Wistron. Immediate steps include restricting network access to IPMI interfaces by implementing strict firewall rules and network segmentation to limit exposure to trusted management networks only. Disable or restrict usage of the vulnerable ipmi-oem subcommands if possible. Monitor IPMI logs for unusual or unexpected OEM command activity. Where feasible, upgrade FreeIPMI to version 1.16.17 or later once available to apply the official fix. If patching is delayed, consider deploying intrusion detection or prevention systems with custom signatures to detect malformed IPMI OEM responses indicative of exploitation attempts. Additionally, enforce strong authentication and encryption on IPMI interfaces to reduce unauthorized access risk, even though this vulnerability does not require authentication. Regularly audit and update IPMI firmware and management tools to minimize exposure to similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-03-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69c2a3a3f4197a8e3b3ed950

Added to database: 3/24/2026, 2:45:55 PM

Last enriched: 3/31/2026, 8:35:52 PM

Last updated: 5/5/2026, 5:07:29 PM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses