Critical severity9.1NVD Advisory· Published Apr 30, 2024· Updated Apr 15, 2026
CVE-2024-3411
CVE-2024-3411
Description
Implementations of IPMI Authenticated sessions does not provide enough randomness to protect from session hijacking, allowing an attacker to use either predictable IPMI Session ID or weak BMC Random Number to bypass security controls using spoofed IPMI packets to manage BMC device.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- kb.cert.org/vuls/id/163057nvd
- www.dell.com/support/kbdoc/en-US/000226504/dsa-2024-295-security-update-for-dell-idrac8-ipmi-session-vulnerabilitynvd
- www.intel.la/content/dam/www/public/us/en/documents/specification-updates/ipmi-intelligent-platform-mgt-interface-spec-2nd-gen-v2-0-spec-update.pdfnvd
- www.kb.cert.org/vuls/id/163057nvd
News mentions
0No linked articles in our index yet.