Metal-as-a-Disservice: Exploiting Legacy Flaws in Cutting-Edge Clouds
This talk demonstrates how insecure configurations and legacy protocols in bare-metal cloud providers allow for cross-tenant remote code execution and persistent firmware backdooring. The researcher highlights vulnerabilities in PXE boot, IPMI/BMC management, and PCI device firmware that bypass modern security assumptions. The presentation provides actionable advice for pentesters on auditing cloud infrastructure, including techniques for BIOS/UEFI modification and network traffic interception. The talk concludes with a call to action for providers to implement robust automated cleaning and secure boot practices.
Breaking the Illusion of Isolation in Bare-Metal Cloud Providers
TLDR: Modern bare-metal cloud providers often fail to implement proper network segmentation and firmware security, creating a massive attack surface for cross-tenant exploitation. By abusing legacy protocols like PXE and insecure IPMI/BMC configurations, researchers can achieve remote code execution and persistent firmware backdooring. Pentesters should prioritize auditing the boot process and network isolation of these environments, as the "physical isolation" promised by vendors is frequently non-existent in practice.
The promise of bare-metal cloud is simple: you get the performance of dedicated hardware without the overhead of a hypervisor. It is the go-to choice for high-intensity machine learning workloads and latency-sensitive applications. However, the security model for these environments is fundamentally broken. While virtualized environments benefit from a decade of hardening at the hypervisor layer, bare-metal providers are often running on a foundation of legacy protocols and misconfigured hardware that effectively hands root access to any tenant who knows where to look.
The Myth of Physical Isolation
Many providers market their bare-metal offerings as "physically isolated," implying that your server is a fortress separated from other customers. In reality, the management plane—the very thing that makes these servers "cloud-native"—is often shared or poorly segmented.
The attack surface starts at the boot process. Most of these servers rely on PXE boot to provision operating systems. Because PXE is an unencrypted, legacy protocol, it is trivial to intercept or spoof. If a provider does not enforce strict network segmentation, a tenant can listen for DHCP requests from other servers in the same data center. By responding to these requests with a malicious PXE boot image, an attacker can push arbitrary code to a victim's server before the OS even loads. This is a classic T1542.001 maneuver, and it works because the hardware trusts the network by default.
Exploiting the Management Plane
If you have access to the server, you have access to the Baseboard Management Controller (BMC). The BMC is the heart of the server, providing out-of-band management via IPMI. Many providers leave default credentials or expose the BMC interface to the internal network.
Using tools like ipmitool, you can often dump the BMC configuration or even reset the device to factory defaults. Once you have control over the BMC, you have a persistent backdoor that survives OS reinstallation. Even worse, if the provider fails to perform a full reflash of the firmware between customers, your malicious configuration remains.
The risk here is not theoretical. Recent research has highlighted critical vulnerabilities in Supermicro BMC software, such as CVE-2024-10237, CVE-2024-10238, and CVE-2024-10239. These flaws allow an attacker to bypass signature verification and inject code into the firmware. If you are testing a bare-metal environment, your first step should be to use Chipsec to audit the platform security.
# Basic enumeration of BIOS/UEFI settings
chipsec_main -m common.bios.info
# Check for common firmware protection gaps
chipsec_main -m common.spi.flash
Network Pivoting and Cross-Tenant Access
The most shocking finding in recent research is the lack of network isolation. In many data centers, a simple nmap scan from a rented bare-metal instance reveals the management interfaces of other customers' servers.
# Scanning for common management ports
nmap -p 22,80,443,5900,623 10.30.10.0/24
If you find an open management interface, you are effectively inside the provider's internal network. From here, you can perform ARP spoofing to intercept traffic or use the provider's own internal services—like a Squid proxy used for caching packages—to tunnel your traffic and bypass firewall rules. This is a direct violation of A01:2021-Broken Access Control, and it turns a single server rental into a platform for lateral movement across the entire data center.
Defensive Realities
Defending against these attacks requires a "zero trust" approach to hardware. Providers must implement automated, cryptographic re-flashing of all firmware—including NICs, GPUs, and BMCs—between every single customer handoff. If the provider does not offer this, you must assume the hardware is compromised.
For your own workloads, treat the bare-metal server as an untrusted node. Use full-disk encryption, enforce strict network-level firewalls that block all traffic to the management network, and never assume that the "physical" separation provided by the vendor protects you from a malicious neighbor.
The next time you spin up a bare-metal instance, don't just run your benchmarks. Run a scan. Check your firmware integrity. The ease with which you can access the management plane of your neighbors is a stark reminder that in the cloud, the only security that matters is the security you verify yourself. If you find a provider that allows you to reach their internal management network, you have found a critical bug that needs to be reported immediately. Don't wait for a vendor to fix it; build your architecture to survive the assumption that the underlying infrastructure is already hostile.
Vulnerability Classes
Tools Used
Target Technologies
Attack Techniques
OWASP Categories
All Tags
Up Next From This Conference

DisguiseDelimit: Exploiting Synology NAS with Delimiters and Novel Tricks

Browser Extension Clickjacking: One Click and Your Credit Card Is Stolen

Can't Stop the ROP: Automating Universal ASLR Bypasses for Windows
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Firewalls Under Fire: China's Ongoing Campaign to Compromise Network Protection Devices

