There's a great post by Rob VandenBrink over at the ISC Handler's Diary
about embedded devices that are hiding in plain sight in your data
center.
I was recently in a client engagement where we had to rebuild /
redeploy some ESXi 4.x servers as ESXi 5.1. This was a simple task,
and quickly done (thanks VMware!), but before we were finished I
realized that we had missed a critical part - the remote managent
[sic] port on the servers. These were iLO ports in this case, as the
servers are HP's, but they could just as easily have been DRAC /
iDRAC (Dell), IMM or AMM (IBM) or BMC (Cisco, anything with a Tyan
motherboard or lots of other vendors). These "remote management
ports are in fact all embedded systems - Linux servers on a card,
booting from flash and usually running a web application. This means
that once you update them (via a flash process) they are "frozen in
time" as far as Linux versions and patches go. In this case, these
iLO cards hadn't been touched in 3 years.
So from a security point of view, all the OS version upgrades and
security patches from the last 3 years had NOT been applied to these
embedded systems.
This is a thorny issue as systems often need downtime to patch these
systems. Check out the thread there for how others are handing or
mitigating this.
Oh, and I'll throw in Sun's LOM (Lights Out Management) to the list.
via [1]ISC Diary | Silent Traitors - Embedded Devices in your
Datacenter.
__________________________________________________________________
My original entry is here: [2]ISC Diary | Silent Traitors - Embedded
Devices in your Datacenter. It posted Tue, 26 Feb 2013 15:31:52 +0000.
Filed under: technology, data center, embedded devices, esx, ilo,
InfoSec, linux, vmware,
References
1.
https://isc.sans.edu/diary/Silent+Traitors+-+Embedded+Devices+in+your+Datacenter/15277
2.
https://www.prjorgensen.com/2013/02/26/isc-diary-silent-traitors-embedded-devices-in-your-datacenter/