欧美性猛交XXXX乱大交_狂野欧美性猛XXXX乱大交_欧美精品XXXXBBBB_A级大胆欧美人体大胆666_欧美xxxx做受性欧美88
網(wǎng)站導航

ABB PFSK164 3BSE021180R1 廈門雄霸電子

當前位置:主頁 > 產(chǎn)品展示 > ABB系統(tǒng)備件

ABB PFSK164 3BSE021180R1 廈門雄霸電子

型號: ABB PFSK164 3BSE021180R1

分類: ABB系統(tǒng)備件

聯(lián)系人:何經(jīng)理

手機:13313705507

QQ:2235954483

郵箱:2235954483@qq.com

地址:廈門市思明區(qū)呂嶺路1733號萬科創(chuàng)想中心2009室

詳細介紹

這個名為IPMI的密碼泄露漏洞是智能型平臺管理接口(Intelligent Platform Management Interface)的縮寫,是管理基于 Intel結(jié)構(gòu)的企業(yè)系統(tǒng)中所使用的外圍設備采用的一種工業(yè)標準,該標準由英特爾、惠普、NEC、美國戴爾電腦和SuperMicro等公司制定。IPMI是一種開放標準的硬件管理接口規(guī)格,定義了嵌入式管理子系統(tǒng)進行通信的特定方法。IPMI 信息通過基板管理控制器 (BMC)(位于 IPMI 規(guī)格的硬件組件上)進行交流。

 

  簡單來說,有了IPMI這個東西,用戶可以利用IPMI監(jiān)視服務器的物理健康特征,如溫度、電壓、風扇工作狀態(tài)、電源狀態(tài)等,更重要的是可以裝系統(tǒng)、開關機、查看操作服務器屏幕輸出,就好比站在服務器面前。

 

  而IPMI是可以通過Web管理的,通過80端口進入管理界面,這里需要賬戶密碼認證,而本次漏洞正是泄漏了這個認證的密碼信息。

 

  山麗網(wǎng)安的專家提醒:這個密碼泄露漏洞可以讓攻擊者不通過認證就可獲得管理密碼,一旦讓黑客獲取服務器的高權(quán)限,造成的嚴重后果可想而知。因此被該漏洞影響的所有服務器應盡快的聯(lián)系廠家進行升級,為避免因漏洞帶來的信息泄露后果,利用靈活且有針對性的加密軟件將重要數(shù)據(jù)加密,有效阻止信息泄露。

 

 

 

 


ABB PFSK164 3BSE021180R1 廈門雄霸電子

This password leakage vulnerability called IPMI is the abbreviation for Intelligent Platform Management Interface, which is an industry standard used to manage peripheral devices used in Intel based enterprise systems. The standard was developed by companies such as Intel, HP, NEC, Dell computers, and SuperMicro in the United States. IPMI is an open standard hardware management interface specification that defines specific methods for communication between embedded management subsystems. IPMI information is communicated through the Baseboard Management Controller (BMC) (located on IPMI specification hardware components).
Simply put, with IPMI, users can use it to monitor the physical health characteristics of servers, such as temperature, voltage, fan operation status, power status, etc. More importantly, they can install the system, turn on/off, and view the output of the server screen, just like standing in front of the server.
And IPMI can be managed through the web, entering the management interface through port 80, where account password authentication is required, and this vulnerability precisely leaks the password information of this authentication.
Experts from Shanli Wangan remind that this password leakage vulnerability can allow attackers to obtain management passwords without authentication. Once hackers gain high privileges on the server, the serious consequences can be imagined. Therefore, all servers affected by this vulnerability should contact the manufacturer as soon as possible to upgrade. To avoid the consequences of information leakage caused by the vulnerability, flexible and targeted encryption software should be used to encrypt important data, effectively preventing information leakage.

 

ABB PFSK164 3BSE021180R1 廈門雄霸電子


推薦產(chǎn)品

如果您有任何問題,請跟我們聯(lián)系!

聯(lián)系我們

Copyright © 2002-2020 廈門雄霸電子商務有限公司 版權(quán)所有

閩公網(wǎng)安備 35020302034927號

備案號:閩ICP備14012685號

地址:廈門市思明區(qū)呂嶺路1733號萬科創(chuàng)想中心2009室

在線客服 聯(lián)系方式 二維碼

服務熱線

13313705507

掃一掃,關注我們

欧美性猛交XXXX乱大交_狂野欧美性猛XXXX乱大交_欧美精品XXXXBBBB_A级大胆欧美人体大胆666_欧美xxxx做受性欧美88