Description
OpenStack Ironic before 35.0.1 allows ipmitool execution in a non-default configuration that has a console interface.
Published: 2026-04-28
Score: 6.6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

OpenStack Ironic versions prior to 35.0.1 allow an attacker who can access a non‑default console interface to invoke ipmitool and execute arbitrary commands on the target node. This flaw is classified as CWE‑78 (OS Command Injection) and CWE‑829 (Excessive Privilege) because the component fails to restrict the resources it exposes. If exploited, an attacker could control the node’s underlying hardware or operating system, potentially leading to full system compromise.

Affected Systems

The vulnerability affects OpenStack Ironic deployments using any version older than 35.0.1. No other vendors or products are listed as affected.

Risk and Exploitability

The CVSS score of 6.6 indicates medium severity. The EPSS score of <1% implies a low probability of exploitation, and the flaw is not listed in CISA’s KEV catalog, suggesting no confirmed large‑scale exploitation yet. The likely attack vector is an authenticated or collaborative administrator who interacts with the console interface that is not configured to default settings. Successful exploitation would require the attacker to supply an ipmitool command through that interface, resulting in remote command execution on the node machine.

Generated by OpenCVE AI on April 29, 2026 at 17:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade OpenStack Ironic to version 35.0.1 or later
  • Disable or remove any non‑default console interfaces that expose ipmitool functionality
  • Apply network or firewall rules to limit access to the console interface only to trusted administrators

Generated by OpenCVE AI on April 29, 2026 at 17:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-wqpv-c3pp-3m58 OpenStack Ironic is Vulnerable to Inclusion of Functionality from Untrusted Control Sphere
History

Wed, 20 May 2026 16:45:00 +0000

Type Values Removed Values Added
References

Thu, 30 Apr 2026 04:30:00 +0000

Type Values Removed Values Added
References

Wed, 29 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Title Non‑Default ipmitool Execution in OpenStack Ironic Console Interface OpenStack Ironic: ipmitool: OpenStack Ironic: Arbitrary Code Execution via Remote Hardware Management
Weaknesses CWE-78
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 28 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 12:45:00 +0000

Type Values Removed Values Added
Title Non‑Default ipmitool Execution in OpenStack Ironic Console Interface

Tue, 28 Apr 2026 06:30:00 +0000

Type Values Removed Values Added
Description OpenStack Ironic through 25.0.0 allows ipmitool execution in a non-default configuration that has a console interface. OpenStack Ironic before 35.0.1 allows ipmitool execution in a non-default configuration that has a console interface.

Tue, 28 Apr 2026 05:30:00 +0000

Type Values Removed Values Added
Description OpenStack Ironic through 25.0.0 allows ipmitool execution in a non-default configuration that has a console interface.
First Time appeared Openstack
Openstack ironic
Weaknesses CWE-829
CPEs cpe:2.3:a:openstack:ironic:*:*:*:*:*:*:*:*
Vendors & Products Openstack
Openstack ironic
References
Metrics cvssV3_1

{'score': 6.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Openstack Ironic
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-20T15:33:10.131Z

Reserved: 2026-04-28T04:53:10.221Z

Link: CVE-2026-42510

cve-icon Vulnrichment

Updated: 2026-04-30T03:05:07.152Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-28T06:16:04.100

Modified: 2026-05-20T17:16:22.640

Link: CVE-2026-42510

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-28T04:53:10Z

Links: CVE-2026-42510 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T17:15:16Z

Weaknesses