Skip to content
Arcadiy Ivanov

Arcadiy Ivanov

Fighting entropy one code line at a time

  • Home
  • Projects
    • Karellen
    • JBOSGi for WildFly
    • PicketLink Subsystem for WildFly 8
  • Legal
  • About

Tag: IPMI

PSA: Default Configuration IPMI Vulnerability on Supermicro Boards

I’m using Supermicro boards (X11SBA-F) for virtually all of my servers, including the firewall. These boards come with IPMI enabled. The IPMI default configuration vulnerability I’m going to describe here rears its ugly head in dual-homed machines and machines plugged directly to WAN, putting them specifically in great danger.

Continue reading “PSA: Default Configuration IPMI Vulnerability on Supermicro Boards”

Author Arcadiy IvanovPosted on 2018-06-16Categories HackingTags BIOS, IPMI, Supermicro, VulnerabilityLeave a comment on PSA: Default Configuration IPMI Vulnerability on Supermicro Boards

Follow Me

  • LinkedIn
  • twitter
  • GitHub
  • OpenHub
  • RSS

Recent Posts

  • One-Way Audio on Asterisk Behind NAT: A Deep Dive into Conntrack Tuple Collisions 2026-03-31
  • How to Optimize Intel Graphics Performance on Fedora KDE Linux Laptop 2019-04-27
  • PSA: Default Configuration IPMI Vulnerability on Supermicro Boards 2018-06-16

Tags

  • asterisk
  • BIOS
  • firmware
  • IPMI
  • JBOSGi
  • JBoss
  • JBossOSGi
  • karellen
  • linux
  • mock
  • NAT
  • networking
  • one-way audio
  • OSGi
  • pbx
  • PicketLink
  • python
  • RTCP
  • RTP
  • SIP
  • ST1000LM014
  • Subsystem
  • Supermicro
  • testing
  • Vulnerability
  • WildFly
  • X11SBA
  • Home
  • Projects
    • Karellen
    • JBOSGi for WildFly
    • PicketLink Subsystem for WildFly 8
  • Legal
  • About
Arcadiy Ivanov Proudly powered by WordPress