[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2013-4786Date: (C)2013-10-17   (M)2023-12-22


The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.5CVSS Score : 7.8
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 3.6Impact Score: 6.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: COMPLETE
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: HIGHAvailability: NONE
Integrity: NONE 
Availability: NONE 
  
Reference:
HPSBHF02981
http://fish2.com/ipmi/remote-pw-cracking.html
http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
https://community.rapid7.com/community/metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipmi
https://nvidia.custhelp.com/app/answers/detail/a_id/5010
https://security.netapp.com/advisory/ntap-20190919-0005/
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04197764

CPE    1
cpe:/a:intel:intelligent_platform_management_interface:2.0
CWE    1
CWE-255

© SecPod Technologies