Impact
OpenStack Ironic versions prior to 35.0.1 allow an attacker who can access a non‑default console interface to invoke ipmitool and execute arbitrary commands on the target node. This flaw is classified as CWE‑78 (OS Command Injection) and CWE‑829 (Excessive Privilege) because the component fails to restrict the resources it exposes. If exploited, an attacker could control the node’s underlying hardware or operating system, potentially leading to full system compromise.
Affected Systems
The vulnerability affects OpenStack Ironic deployments using any version older than 35.0.1. No other vendors or products are listed as affected.
Risk and Exploitability
The CVSS score of 6.6 indicates medium severity. The EPSS score of <1% implies a low probability of exploitation, and the flaw is not listed in CISA’s KEV catalog, suggesting no confirmed large‑scale exploitation yet. The likely attack vector is an authenticated or collaborative administrator who interacts with the console interface that is not configured to default settings. Successful exploitation would require the attacker to supply an ipmitool command through that interface, resulting in remote command execution on the node machine.
OpenCVE Enrichment
Github GHSA