VLAN764_ELET – 10.114.113.217

VLAN: 764CIDR: 10.114.112.0/22NAT: 193.224.49.128Nessus mappa: 1472
Scan: VLAN764_-_ELET_10.114.112.0_22Dátum: 2026-01-30 16:08

HIGH (1)

IPMI v2.0 Password Hash Disclosure
Plugin ID: 80101 Port: udp/623 CVE: CVE-2013-4786
The remote host supports IPMI v2.0. The Intelligent Platform Management Interface (IPMI) protocol is affected by an information disclosure vulnerability due to the support of RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication. A remote attacker can obtain password hash information for valid user accounts via the HMAC from a RAKP message 2 response from a BMC.
Javasolt megoldás
There is no patch for this vulnerability; it is an inherent problem with the specification for IPMI v2.0. Suggested mitigations include : - Disabling IPMI over LAN if it is not needed. - Using strong passwords to limit the successfulness of off-line dictionary attacks. - Using Access Control Lists (ACLs) or isolated networks to limit access to your IPMI management interfaces.