by tmalsburg2 on 4/11/24, 7:46 PM with 12 comments
by transpute on 4/12/24, 1:09 AM
For unsupported but functional hardware with vulnerable BMCs, it would be helpful to have a toolkit (e.g. stacking multiple exploits) for hardware owners to replace the vulnerable software with OpenBMC, https://github.com/openbmc/openbmc.
Abandoned hardware owners could crowdfund an effort to add OpenBMC compatibility testing for their devices. This also falls under the rubric of repairability technology and a circular economy for electronics.
by c_o_n_v_e_x on 4/12/24, 6:47 AM
I've never heard of AETN before? I thought maybe they could be Insyde, a competitor to AMI, out of Taiwan, who also develops BMC firmware, but could not find a connection with "AETN." Phoenix is another BMC firmware developer although they've been focusing on OpenBMC.
ASPEED out of Taiwan is huge in the BMC chip business. There are some new FPGA based implementations for BMC / BMC-like cards based on standards that have come out of the open compute group... pretty cool stuff.
by hulitu on 4/12/24, 7:39 AM
by m463 on 4/12/24, 4:53 AM
Can you really prevent this with a bios setting?
would using a 3rd party (pcie or usb) ethernet adapter prevent it?
by 3np on 4/12/24, 7:03 AM
by effluvium on 4/11/24, 11:45 PM
For personal computing, any recommendations on motherboard manufacturers who take security seriously?