"This means that even if the iLO network cable is completely disconnected, there is still the possibility of infection with the malware. Type the version command, which returns output similar to the following: -> version.
Update firmware file permission and run it.
To update iLO, there is no need to restart the server. checking the picture you don't have iLOP 2 you RILOE(Remote Insight Lights-Out Edition II) II which is completely different and the latest version is 1. Note: To ensure the latest version will be downloaded, click on the Revision History tab to check if a new version of the firmware/driver is available. In the test, I will update iLO4 on the HP ProLiant D元80p G8 server with iLO version 1.13 (Nov 08 2012), as well as on several other servers, ProLiant D元60p Gen8, ProLiant D元20e Gen8 v2, etc. Confirm downloaded packages are full by comparing sha256sum result. Select the HPE Integrated Lights-Out 2 Firmware version earlier than v2.33.
For this, we must install the latest firmware version, to maintain security in both systems, server and workstations. This is issue it can be resolved with later version ILO firmware. "Another important point is that there are methods to access and infect iLO both through the network and through the host operating system," the researchers noted. Download HPE iLO firmware files from HPE portal. After unselecting TLS 1.2 from Internet Explorer 11, It was possible to connect to ILO interface. If anything, the development once again brings firmware security into sharp focus, necessitating that firmware updates shipped by the manufacturer are promptly applied to mitigate potential risks, iLO networks are segmented from the operating networks, and that the firmware is periodically monitored for signs of infection. Given that versions iLO 4 and prior are at more risk of being modified and infected by the malware, the enterprise IT firm pointed out that customers who followed the recommended corrective actions or have upgraded to iLO 5 are not susceptible to exploitation.
HPE, in a statement shared with The Hacker News said that the vulnerability being exploited is not new and that it was disclosed and patched by the company in 2017.