Three BMC Vulnerabilities Impact Manufacturers Industrywide

Much of the risk of these vulnerabilities can be mitigated by controlling access to remote management interfaces. Companies should endeavor to never leave these exposed to the internet, and further limit which devices or networks can access these interfaces. User behavior analysis can help identify exploitation of vulnerabilities like these; mass password reset requests and root-level activities that differ from baseline can be reliable indicators of a compromise.

https://thehackernews.com/2022/12/new-bmc-supply-chain-vulnerabilities.html