
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2020-5208 affects ipmitool versions before 1.8.19, where multiple functions neglect proper checking of data received from remote LAN parties. The vulnerability was discovered in early 2020 and affects the command-line utility used for interfacing with devices that support the Intelligent Platform Management Interface (IPMI) specification (GitHub Advisory, NVD).
The vulnerability specifically involves buffer overflow issues in the read_fru_area_section function in lib/ipmi_fru.c. The affected functions fail to properly validate the size of data received from remote IPMI-enabled devices, which can lead to buffer overflows. The vulnerability has been assigned a CVSS 3.1 base score of 8.8 (High), with attack vector being Network, attack complexity Low, and requiring Low privileges (Ubuntu Security).
The vulnerability could potentially lead to remote code execution on the ipmitool side, with the impact being particularly severe if ipmitool is running with privileged user access. The security issue affects confidentiality, integrity, and availability of the system, with all having High impact ratings (GitHub Advisory).
The primary mitigation is to upgrade to ipmitool version 1.8.19 or later which contains the fix. For users unable to upgrade immediately, workarounds include not running ipmitool as a privileged user and avoiding running ipmitool over demilitarized networks or against untrusted IPMI-enabled devices (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."