CVE-2024-3411
April 30, 2024, 7:35 p.m.
None
No Score
Description
Implementations of IPMI Authenticated sessions does not provide enough randomness to protect from session hijacking, allowing an attacker to use either predictable IPMI Session ID or weak BMC Random Number to bypass security controls using spoofed IPMI packets to manage BMC device.
Product(s) Impacted
Product | Versions |
---|---|
IPMI |
|
Weaknesses
Tags
Date
- Published: April 30, 2024, 7:15 p.m.
- Last Modified: April 30, 2024, 7:35 p.m.
Status : Awaiting Analysis
CVE has been marked for Analysis. Normally once in this state the CVE will be analyzed by NVD staff within 24 hours.
More infoSource
cret@cert.org
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.