CVE-2013-4786

The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.

Published date
2013-07-08T22:55Z
Last modification date
2020-10-29T00:15Z
Assigner
cve@mitre.org
Problem type
CWE-255

Impact

CVSS v3 vector string
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
NameURLSourceTags
http://fish2.com/ipmi/remote-pw-cracking.htmlhttp://fish2.com/ipmi/remote-pw-cracking.htmlMISC
https://community.rapid7.com/community/metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipmihttps://community.rapid7.com/community/metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipmiMISC
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlCONFIRM
HPSBHF02981http://marc.info/?l=bugtraq&m=139653661621384&w=2HP
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04197764https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04197764CONFIRM
https://security.netapp.com/advisory/ntap-20190919-0005/https://security.netapp.com/advisory/ntap-20190919-0005/CONFIRM
https://nvidia.custhelp.com/app/answers/detail/a_id/5010https://nvidia.custhelp.com/app/answers/detail/a_id/5010CONFIRM