Lucene search

K
ubuntucveUbuntu.comUB:CVE-2013-4786
HistoryJul 08, 2013 - 12:00 a.m.

CVE-2013-4786

2013-07-0800:00:00
ubuntu.com
ubuntu.com
29

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:C/I:N/A:N

0.272 Low

EPSS

Percentile

96.7%

The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange
Protocol (RAKP) authentication, which allows remote attackers to obtain
password hashes and conduct offline password guessing attacks by obtaining
the HMAC from a RAKP message 2 response from a BMC.

Notes

Author Note
jdstrand protocol problem. Not clear if fixes also need to be addressed in freeipmi and openipmi per Debian: “Contacted relevant maintainers: Since few to no devices do mutual authentication, tools shipped by Debian are generally not affected. At best, the tools can print a warning for vulnerable devices.”

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:C/I:N/A:N

0.272 Low

EPSS

Percentile

96.7%