Kuboid
Open Luck·Kuboid.in

Metal-as-a-Disservice: Exploiting Legacy Flaws in Cutting-Edge Clouds

DEFCONConference741 views46:166 months ago

This talk demonstrates how insecure configurations and legacy protocols in bare-metal cloud providers allow for cross-tenant remote code execution and persistent firmware backdooring. The researcher highlights vulnerabilities in PXE boot, IPMI/BMC management, and PCI device firmware that bypass modern security assumptions. The presentation provides actionable advice for pentesters on auditing cloud infrastructure, including techniques for BIOS/UEFI modification and network traffic interception. The talk concludes with a call to action for providers to implement robust automated cleaning and secure boot practices.

Breaking the Illusion of Isolation in Bare-Metal Cloud Providers

TLDR: Modern bare-metal cloud providers often fail to implement proper network segmentation and firmware security, creating a massive attack surface for cross-tenant exploitation. By abusing legacy protocols like PXE and insecure IPMI/BMC configurations, researchers can achieve remote code execution and persistent firmware backdooring. Pentesters should prioritize auditing the boot process and network isolation of these environments, as the "physical isolation" promised by vendors is frequently non-existent in practice.

The promise of bare-metal cloud is simple: you get the performance of dedicated hardware without the overhead of a hypervisor. It is the go-to choice for high-intensity machine learning workloads and latency-sensitive applications. However, the security model for these environments is fundamentally broken. While virtualized environments benefit from a decade of hardening at the hypervisor layer, bare-metal providers are often running on a foundation of legacy protocols and misconfigured hardware that effectively hands root access to any tenant who knows where to look.

The Myth of Physical Isolation

Many providers market their bare-metal offerings as "physically isolated," implying that your server is a fortress separated from other customers. In reality, the management plane—the very thing that makes these servers "cloud-native"—is often shared or poorly segmented.

The attack surface starts at the boot process. Most of these servers rely on PXE boot to provision operating systems. Because PXE is an unencrypted, legacy protocol, it is trivial to intercept or spoof. If a provider does not enforce strict network segmentation, a tenant can listen for DHCP requests from other servers in the same data center. By responding to these requests with a malicious PXE boot image, an attacker can push arbitrary code to a victim's server before the OS even loads. This is a classic T1542.001 maneuver, and it works because the hardware trusts the network by default.

Exploiting the Management Plane

If you have access to the server, you have access to the Baseboard Management Controller (BMC). The BMC is the heart of the server, providing out-of-band management via IPMI. Many providers leave default credentials or expose the BMC interface to the internal network.

Using tools like ipmitool, you can often dump the BMC configuration or even reset the device to factory defaults. Once you have control over the BMC, you have a persistent backdoor that survives OS reinstallation. Even worse, if the provider fails to perform a full reflash of the firmware between customers, your malicious configuration remains.

The risk here is not theoretical. Recent research has highlighted critical vulnerabilities in Supermicro BMC software, such as CVE-2024-10237, CVE-2024-10238, and CVE-2024-10239. These flaws allow an attacker to bypass signature verification and inject code into the firmware. If you are testing a bare-metal environment, your first step should be to use Chipsec to audit the platform security.

# Basic enumeration of BIOS/UEFI settings
chipsec_main -m common.bios.info
# Check for common firmware protection gaps
chipsec_main -m common.spi.flash

Network Pivoting and Cross-Tenant Access

The most shocking finding in recent research is the lack of network isolation. In many data centers, a simple nmap scan from a rented bare-metal instance reveals the management interfaces of other customers' servers.

# Scanning for common management ports
nmap -p 22,80,443,5900,623 10.30.10.0/24

If you find an open management interface, you are effectively inside the provider's internal network. From here, you can perform ARP spoofing to intercept traffic or use the provider's own internal services—like a Squid proxy used for caching packages—to tunnel your traffic and bypass firewall rules. This is a direct violation of A01:2021-Broken Access Control, and it turns a single server rental into a platform for lateral movement across the entire data center.

Defensive Realities

Defending against these attacks requires a "zero trust" approach to hardware. Providers must implement automated, cryptographic re-flashing of all firmware—including NICs, GPUs, and BMCs—between every single customer handoff. If the provider does not offer this, you must assume the hardware is compromised.

For your own workloads, treat the bare-metal server as an untrusted node. Use full-disk encryption, enforce strict network-level firewalls that block all traffic to the management network, and never assume that the "physical" separation provided by the vendor protects you from a malicious neighbor.

The next time you spin up a bare-metal instance, don't just run your benchmarks. Run a scan. Check your firmware integrity. The ease with which you can access the management plane of your neighbors is a stark reminder that in the cloud, the only security that matters is the security you verify yourself. If you find a provider that allows you to reach their internal management network, you have found a critical bug that needs to be reported immediately. Don't wait for a vendor to fix it; build your architecture to survive the assumption that the underlying infrastructure is already hostile.

Talk Type
research presentation
Difficulty
advanced
Has Demo Has Code Tool Released


DEF CON 33 Main Stage Talks

98 talks · 2025
Browse conference →
Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in