Dell EMC Patches iDRAC Vulnerability

Dell EMC Patches iDRAC Vulnerability

A vulnerability in the Integrated Dell Remote Access Controller (iDRAC) that could have allowed cyber-criminals to gain full control of server operations has been detected.





The controller was designed for secure local and remote server management to help IT administrators deploy, update, and monitor Dell EMC PowerEdge servers.





Path Traversal vulnerability CVE-2020-5366 was discovered by researchers Georgy Kiguradze and Mark Ermolov at Positive Technologies. It has a score of 7.1, reflecting a high degree of danger.





By exploiting the flaw, a remote authenticated user could turn the product on or off or change its cooling or power settings. Such actions may sound relatively harmless, but they could potentially eat into the profits of businesses already struggling as a result of the global pandemic. 





"If important services are running on these servers, that could cause them to become temporarily unavailable, potentially resulting in losses for businesses," said a Positive Technologies spokesperson. 







Kiguradze said that if attackers obtained the backup of a privileged user, they could use the vulnerability to block or disrupt the server's operation. 





He explained: “The iDRAC controller is used to manage key servers, effectively functioning as a separate computer inside the server itself. iDRAC runs on ordinary Linux, although in a limited configuration, and has a fully-fledged file system. The vulnerability makes it possible to read any file in the controller's operating system, and in some cases to inter ..

Support the originator by clicking the read the rest link below.