CVE-2020-26122

Inspur NF5266M5 through 3.21.2 and other server M5 devices allow remote code execution via administrator privileges. The Baseboard Management Controller (BMC) program of INSPUR server is weak in checking the firmware and lacks the signature verification mechanism, the attacker who obtains the administrator's rights can control the BMC by inserting malicious code into the firmware program and bypassing the current verification mechanism to upgrade the BMC.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:inspur:nf8480m5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inspur:nf8480m5:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:inspur:nf8260m5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inspur:nf8260m5:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:inspur:ns5162m5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inspur:ns5162m5:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:inspur:ns5488m5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inspur:ns5488m5:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:inspur:ns5484m5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inspur:ns5484m5:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:inspur:ns5482m5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inspur:ns5482m5:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:inspur:nf5280m5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inspur:nf5280m5:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:inspur:nf5468m5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inspur:nf5468m5:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:inspur:nf5488m5-d_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inspur:nf5488m5-d:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:inspur:nf5180m5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inspur:nf5180m5:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:inspur:nf5270m5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inspur:nf5270m5:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:inspur:nf5260m5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inspur:nf5260m5:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:inspur:nf5266m5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inspur:nf5266m5:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:inspur:nf5466m5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inspur:nf5466m5:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:inspur:nf5486m5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:inspur:nf5486m5:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:19

Type Values Removed Values Added
References () https://en.inspur.com/en/2487134/index.html - Broken Link () https://en.inspur.com/en/2487134/index.html - Broken Link
References () https://en.inspur.com/en/security_bulletins/security_advisory2/2543921/index.html - Vendor Advisory () https://en.inspur.com/en/security_bulletins/security_advisory2/2543921/index.html - Vendor Advisory

Information

Published : 2020-12-07 16:15

Updated : 2024-11-21 05:19


NVD link : CVE-2020-26122

Mitre link : CVE-2020-26122

CVE.ORG link : CVE-2020-26122


JSON object : View

Products Affected

inspur

  • nf8260m5_firmware
  • ns5162m5_firmware
  • nf5466m5
  • nf8480m5_firmware
  • ns5482m5_firmware
  • nf5260m5
  • ns5482m5
  • ns5484m5
  • nf5488m5-d_firmware
  • nf8260m5
  • nf5488m5-d
  • nf5270m5_firmware
  • nf5468m5_firmware
  • nf5466m5_firmware
  • nf5260m5_firmware
  • ns5484m5_firmware
  • nf5266m5_firmware
  • nf8480m5
  • nf5266m5
  • ns5488m5_firmware
  • ns5488m5
  • nf5180m5
  • nf5180m5_firmware
  • ns5162m5
  • nf5280m5
  • nf5270m5
  • nf5468m5
  • nf5280m5_firmware
  • nf5486m5
  • nf5486m5_firmware
CWE
CWE-347

Improper Verification of Cryptographic Signature