ID CVE-2013-4786
Summary The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.
References
Vulnerable Configurations
  • cpe:2.3:o:oracle:fujitsu_m10_firmware:2290:*:*:*:*:*:*:*
    cpe:2.3:o:oracle:fujitsu_m10_firmware:2290:*:*:*:*:*:*:*
  • cpe:2.3:a:intel:intelligent_platform_management_interface:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:intel:intelligent_platform_management_interface:2.0:*:*:*:*:*:*:*
CVSS
Base: 7.8 (as of 29-10-2020 - 00:15)
Impact:
Exploitability:
CWE CWE-255
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:N/A:N
refmap via4
confirm
hp HPSBHF02981
misc
Last major update 29-10-2020 - 00:15
Published 08-07-2013 - 22:55
Last modified 29-10-2020 - 00:15
Back to Top