{"id":37985,"date":"2019-02-27T10:43:05","date_gmt":"2019-02-27T10:43:05","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=c36c3397e227f9d21063c287141fc12d"},"modified":"2019-02-27T10:43:05","modified_gmt":"2019-02-27T10:43:05","slug":"bare-metal-flaw-allows-hackers-to-put-backdoors-into-cloud-servers","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/bare-metal-flaw-allows-hackers-to-put-backdoors-into-cloud-servers\/","title":{"rendered":"Bare metal flaw allows hackers to put backdoors into cloud servers"},"content":{"rendered":"<p><span class=\"field field-name-field-author field-type-node-reference field-label-hidden\"><br \/>\n      <span class=\"field-item even\"><a href=\"https:\/\/www.cloudpro.co.uk\/authors\/rene-millman\">Rene Millman<\/a><\/span><br \/>\n  <\/span><\/p>\n<div class=\"field field-name-field-published-date field-type-datetime field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><span class=\"date-display-single\">27 Feb, 2019<\/span><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"short-teaser\">\n<a href=\"https:\/\/www.cloudpro.co.uk\/\" title=\"\" class=\"combined-link\"><\/a><\/p>\n<div class=\"field field-name-body\">\n<p> A new flaw has been discovered by security researchers that could enable hackers to install backdoors on the firmware of bare-metal cloud servers that stay active even when the customer using the hardware has been re-assigned elsewhere.<\/p>\n<p>Called \u201cCloudbourne\u201d, the vulnerability was first discovered by researchers at the Eclypsium Research Team, who detailed their findings in a\u00a0<a href=\"https:\/\/eclypsium.com\/2019\/01\/26\/the-missing-security-primer-for-bare-metal-cloud-services\/\">blog post<\/a>. They found that hackers could plant backdoors and malware in the firmware of a server, or in its baseboard management controller (BMC), with relative ease.<\/p>\n<p>These BMCs enable remote management of a server for initial provisioning, operating system reinstall and troubleshooting. Cloudborne exploits a flaw in the hardware\u2019s reclamation process when moving clients on and off a bare metal server.<\/p>\n<p>While physical servers are dedicated to one customer at a time, they don\u2019t stay that way forever,\u201d said researchers. \u201cServers are provisioned and reclaimed over time and naturally move from customer to customer.\u201d<\/p>\n<p>The firmware of the hardware is not reflashed in the reclamation process, allowing backdoors to persist. A hacker uses a <a href=\"https:\/\/eclypsium.com\/2018\/06\/07\/firmware-vulnerabilities-in-supermicro-systems\/\">known<\/a> vulnerability in Supermicro hardware to rewrite the BMC and gain direct access to the hardware.<\/p>\n<p>Researchers said that hackers \u201ccould spend a nominal sum of money for access to a server, implant malicious firmware at the UEFI, BMC, or even component level, such as in drives or network adapters. Then the attacker could release the hardware back to the service provider, which could put it back into use with another customer.\u201d<\/p>\n<p>They added that given a BMC\u2019s ability to control the server, any compromises to that firmware can provide access to powerful tools for an attacker to exploit.<\/p>\n<p>\u201cGiven the nature of the applications and data hosted on bare-metal offerings, this opens up the possibility for high-impact attack scenarios,\u201d they said.<\/p>\n<p>These scenarios include application disruption, where a malicious implant at the BMC level could permanently disable a server; data theft, as it provides attackers with another very low-level way of stealing or intercepting data; and ransomware attacks, as attackers would naturally have the ability to take hold of valuable assets.<\/p>\n<p>The backdoor could also compromise other parts of cloud infrastructure. For example, hackers could send malicious IPMI commands over system interfaces from the host without the commands being authenticated.<\/p>\n<p>\u201cSince there is no authentication performed when using system interfaces, the only barrier to running arbitrary code within the BMC is whether the BMC itself performs cryptographically secure signature verification of the firmware update image before applying the update. Unfortunately, not all BMCs perform this check, and even when they do, malware can exploit vulnerabilities in the BMC firmware to bypass it,\u201d noted researchers.<\/p>\n<p>Researchers said that as firmware underlies even the host operating system and the virtualization layers of a server, any implants would naturally be able to subvert any controls and security measures running at these higher layers. <\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>      Rene Millman<\/p>\n<p>        27 Feb, 2019    <\/p>\n<p>       A new flaw has been discovered by security researchers that could enable hackers to install backdoors on the firmware of bare-metal cloud servers that stay active even when the customer using t&#8230;<\/p>\n","protected":false},"author":417,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-37985","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/37985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/417"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=37985"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/37985\/revisions"}],"predecessor-version":[{"id":37986,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/37985\/revisions\/37986"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=37985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=37985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=37985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}