Vulnerability Description
ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: "ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers," "ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers," and "ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers."
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://ftp.gnu.org/gnu/freeipmi/
- https://savannah.gnu.org/bugs/?68140
- https://savannah.gnu.org/bugs/?68141
- https://savannah.gnu.org/bugs/?68142
FAQ
What is CVE-2026-33554?
CVE-2026-33554 is a vulnerability with a CVSS score of 7.5 (HIGH). ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform m...
How severe is CVE-2026-33554?
CVE-2026-33554 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33554?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.