• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
intel and lenovo bmcs contain unpatched lighttpd server flaw

Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw

You are here: Home / General Cyber Security News / Intel and Lenovo BMCs Contain Unpatched Lighttpd Server Flaw
April 15, 2024

A security flaw impacting the Lighttpd web server made use of in baseboard administration controllers (BMCs) has remained unpatched by gadget suppliers like Intel and Lenovo, new findings from Binarly reveal.

Even though the primary shortcoming was discovered and patched by the Lighttpd maintainers way back in August 2018 with model 1.4.51, the absence of a CVE identifier or an advisory intended that it was forgotten by builders of AMI MegaRAC BMC, in the end ending up in solutions produced by Intel and Lenovo.

Lighttpd (pronounced “Lighty”) is an open-source higher-general performance web server application created for pace, security, and adaptability, although optimized for significant-efficiency environments with out consuming a ton of technique assets.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The silent fix for Lighttpd fears an out-of-bounds study vulnerability that could be exploited to exfiltrate sensitive details, these kinds of as procedure memory addresses, thereby letting menace actors to bypass very important security mechanisms like address house format randomization (ASLR).

Cybersecurity

“The absence of prompt and significant data about security fixes prevents suitable dealing with of these fixes down the two the firmware and software program source chains,” the firmware security enterprise mentioned.

The flaws are explained under –

  • Out-of-bounds examine in Lighttpd 1.4.45 employed in Intel M70KLP collection firmware
  • Out-of-bounds study in Lighttpd 1.4.35 employed in Lenovo BMC firmware
  • Out-of-bounds go through in Lighttpd ahead of 1.4.51

Intel and Lenovo have opted not to tackle the issue as the merchandise incorporating the inclined version of Lighttpd have strike end-of-everyday living (EoL) position and are no longer suitable for security updates, successfully turning it into a endlessly-day bug.

Intel and Lenovo BMCs

The disclosure highlights how the presence of outdated 3rd-party elements in the most up-to-date model of firmware can traverse the source chain and pose unintended security risks for finish consumers.

“This is however a further vulnerability that will remain unfixed endlessly in some products and solutions and will present superior-effects risk to the business for a really very long time,” Binarly included.

Found this post interesting? Stick to us on Twitter  and LinkedIn to read through far more special articles we write-up.


Some components of this posting are sourced from:
thehackernews.com

Previous Post: «ai copilot: launching innovation rockets, but beware of the darkness AI Copilot: Launching Innovation Rockets, But Beware of the Darkness Ahead
Next Post: Hive RAT Creators and $3.5M Cryptojacking Mastermind Arrested in Global Crackdown hive rat creators and $3.5m cryptojacking mastermind arrested in global»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.