The specific function in ASUS BMC’s firmware Web management page (Modify user’s information function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.

Project Subscriptions

Vendors Products
Asmb9-ikvm Subscribe
Asmb9-ikvm Firmware Subscribe
E700 G4 Subscribe
E700 G4 Firmware Subscribe
Esc4000 Dhd G4 Subscribe
Esc4000 Dhd G4 Firmware Subscribe
Esc4000 G4 Subscribe
Esc4000 G4 Firmware Subscribe
Esc4000 G4x Subscribe
Esc4000 G4x Firmware Subscribe
Esc8000 G4 Subscribe
Esc8000 G4\/10g Subscribe
Esc8000 G4\/10g Firmware Subscribe
Esc8000 G4 Firmware Subscribe
Knpa-u16 Subscribe
Knpa-u16 Firmware Subscribe
Pro E800 G4 Subscribe
Pro E800 G4 Firmware Subscribe
Rs100-e10-pi2 Subscribe
Rs100-e10-pi2 Firmware Subscribe
Rs300-e10-ps4 Subscribe
Rs300-e10-ps4 Firmware Subscribe
Rs300-e10-rs4 Subscribe
Rs300-e10-rs4 Firmware Subscribe
Rs500-e9-ps4 Subscribe
Rs500-e9-ps4 Firmware Subscribe
Rs500-e9-rs4 Subscribe
Rs500-e9-rs4-u Subscribe
Rs500-e9-rs4-u Firmware Subscribe
Rs500-e9-rs4 Firmware Subscribe
Rs500a-e10-ps4 Subscribe
Rs500a-e10-ps4 Firmware Subscribe
Rs500a-e10-rs4 Subscribe
Rs500a-e10-rs4 Firmware Subscribe
Rs500a-e9-ps4 Subscribe
Rs500a-e9-ps4 Firmware Subscribe
Rs500a-e9-rs4 Subscribe
Rs500a-e9-rs4 Firmware Subscribe
Rs500a-e9 Rs4 U Subscribe
Rs500a-e9 Rs4 U Firmware Subscribe
Rs520-e9-rs12-e Subscribe
Rs520-e9-rs12-e Firmware Subscribe
Rs520-e9-rs8 Subscribe
Rs520-e9-rs8 Firmware Subscribe
Rs700-e9-rs12 Subscribe
Rs700-e9-rs12 Firmware Subscribe
Rs700-e9-rs4 Subscribe
Rs700-e9-rs4 Firmware Subscribe
Rs700a-e9-rs12v2 Subscribe
Rs700a-e9-rs12v2 Firmware Subscribe
Rs700a-e9-rs4 Subscribe
Rs700a-e9-rs4 Firmware Subscribe
Rs700a-e9-rs4v2 Subscribe
Rs700a-e9-rs4v2 Firmware Subscribe
Rs720-e9-rs12-e Subscribe
Rs720-e9-rs12-e Firmware Subscribe
Rs720-e9-rs24-u Subscribe
Rs720-e9-rs24-u Firmware Subscribe
Rs720-e9-rs8-g Subscribe
Rs720-e9-rs8-g Firmware Subscribe
Rs720a-e9-rs12v2 Subscribe
Rs720a-e9-rs12v2 Firmware Subscribe
Rs720a-e9-rs24-e Subscribe
Rs720a-e9-rs24-e Firmware Subscribe
Rs720a-e9-rs24v2 Subscribe
Rs720a-e9-rs24v2 Firmware Subscribe
Rs720q-e9-rs24-s Subscribe
Rs720q-e9-rs24-s Firmware Subscribe
Rs720q-e9-rs8 Subscribe
Rs720q-e9-rs8-s Subscribe
Rs720q-e9-rs8-s Firmware Subscribe
Rs720q-e9-rs8 Firmware Subscribe
Ws C422 Pro\/se Subscribe
Ws C422 Pro\/se Firmware Subscribe
Ws C621e Sage Subscribe
Ws C621e Sage Firmware Subscribe
Ws X299 Pro\/se Subscribe
Ws X299 Pro\/se Firmware Subscribe
Z11pa-d8 Subscribe
Z11pa-d8 Firmware Subscribe
Z11pa-d8c Subscribe
Z11pa-d8c Firmware Subscribe
Z11pa-u12 Subscribe
Z11pa-u12\/10g-2s Subscribe
Z11pa-u12\/10g-2s Firmware Subscribe
Z11pa-u12 Firmware Subscribe
Z11pr-d16 Subscribe
Z11pr-d16 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-14889 The specific function in ASUS BMC’s firmware Web management page (Modify user’s information function) does not verify the string length entered by users, resulting in a Buffer overflow vulnerability. As obtaining the privileged permission, remote attackers use the leakage to abnormally terminate the Web service.
Fixes

Solution

update BMC's firmwares to the following versions: ESC4000 G4X 1.15.6 RS700-E9-RS12 1.15.4 RS100-E10-PI2 1.15.3 RS300-E10-PS4 1.15.3 RS300-E10-RS4 1.15.3 RS500A-E9-PS4 1.14.2 RS500A-E9-RS4 1.14.2 RS500A-E9 RS4 U 1.14.2 E700 G4 1.14.2 WS C422 PRO/SE 1.14.2 WS X299 PRO/SE 1.14.2 Z11PA-U12 1.15.2 KNPA-U16 1.14.5 ESC4000 DHD G4 1.15.2 ESC4000 G4 1.15.6 RS720Q-E9-RS24-S 1.15.1 RS720Q-E9-RS8 1.15.1 RS720Q-E9-RS8-S 1.15.1 Z11PA-D8 1.15.2 Z11PA-D8C 1.15.2 RS720-E9-RS24-U 1.15.5 RS720-E9-RS8-G 1.15.4 RS500-E9-PS4 1.15.5 Pro E800 G4 1.15.2 RS500-E9-RS4 1.15.5 RS500-E9-RS4-U 1.15.5 RS520-E9-RS12-E 1.15.4 RS520-E9-RS8 1.15.4 ESC8000 G4 1.15.5 ESC8000 G4/10G 1.15.5 RS720-E9-RS12-E 1.15.3 WS C621E SAGE 1.15.3 RS500A-E10-PS4 1.15.3 RS500A-E10-RS4 1.15.3 RS700A-E9-RS12V2 1.15.3 RS700A-E9-RS4V2 1.15.3 RS720A-E9-RS12V2 1.15.3 RS720A-E9-RS24V2 1.15.3 Z11PR-D16 1.15.4


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: twcert

Published:

Updated: 2024-09-16T16:48:36.806Z

Reserved: 2021-03-12T00:00:00

Link: CVE-2021-28199

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-04-06T05:15:16.583

Modified: 2024-11-21T05:59:20.350

Link: CVE-2021-28199

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses