Researchers compromise bare-metal cloud servers

Image Credit: Pexels (Image credit: Image Credit: Manuel Geissinger / Pexels)

A new report from the hardware security firm Eclypsium has revealed that hackers can corrupt the firmware of bare-metal cloud servers so that they can regain access to the servers after they've been released and reassigned to other customers.

A bare-metal server is a physical server that is rented to one customer at a time and many companies in the cloud services industry offer these servers to their customers because of their flexibility and security benefits. Once a customer is finished with the server, it is released back to the cloud company and the provider wipes the server of any customer data so that it can make it available to others.

However, in its latest experiment, Eclypsium discovered that cloud service providers are not doing enough when it comes to properly wiping base-metal servers.

The team was successfully able to make modifications to a server's baseboard management controller (BMC) firmware which a potential attacker could use to access a server after it was wiped and reassigned to another customer.

Bare-metal cloud server security

Last year, researchers from Eclypsium discovered vulnerabilities in the BMC firmware of Super Micro motherboards and they used this knowledge to exploit IBM's SoftLayer cloud service which uses Super Micro hardware.

The company explained why it chose IBM SoftLayer for its experiment, saying:

“We originally chose SoftLayer for our testing environment because of its simplified logistics and access to hardware but noticed SoftLayer was using SuperMicro server hardware that based on our previous research we knew were vulnerable. It should be noted that SoftLayer uses other hardware vendors in addition to SuperMicro, and SuperMicro devices are used by many other service providers."

Eclypsium called its successful test Cloudborne and the company's research team was able to update a rented bare-metal server's BMC firmware with one they had prepared in advance which contained just one single bit flip so that they could recognize it at a later point. However, an attacker could add malicious code to the BMC firmware opening a server up to backdoor accounts.

IBM responded to Eclypsium's research in a blog post in which it detailed how it had reconfigured its cloud service to reflash all BMC firmware to factory settings and erase all logs and generate new passwords for each client.

Via ZDNet

Anthony Spadafora

After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home. 

Latest in Pro
Woman shocked by online scam, holding her credit card outside
Cybercriminals used vendor backdoor to steal almost $600,000 of Taylor Swift tickets
Customer service 3D manager concept. AI assistance headphone call center
The era of Agentic AI
Woman using iMessage on iPhone
UK government guidelines remove encryption advice following Apple backdoor spat
Cryptocurrencies
Ransomware’s favorite Russian crypto exchange seized by law enforcement
A hand reaching out to touch a futuristic rendering of an AI processor.
Balancing innovation and security in an era of intensifying global competition
Wordpress brand logo on computer screen. Man typing on the keyboard.
Thousands of WordPress sites targeted with malicious plugin backdoor attacks
Latest in News
A collage of Ellie and Joel in The Last of Us season 2
The Last of Us season 2's new trailer teases a huge showdown between Bella Ramsey's Ellie and Pedro Pascal's Joel, but the big moment I'm waiting for is still being held back
Apple iPhone 16 Pro Max REVIEW
New iPhone 17 Air leak may have revealed some key specs – and how it compares to the iPhone 17 Pro Max
Gaming with AI
I asked Gemini to play a text-based adventure game with me and the AI whisked me away to a word-based fantasy
Apple iPhone 16 Review
Three iPhone 17 model dummy units appear in a hands-on video leak
The Samsung Galaxy S25 Edge on display the January 22, 2025 Galaxy Unpacked event.
New Samsung Galaxy S25 Edge may have revealed some key details – including its price
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 10 (game #1141)