<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPMI v2.0 password hash disclosure Vulnerability in Cisco Catalyst Center</title>
    <link>https://community.cisco.com/t5/cisco-catalyst-center/ipmi-v2-0-password-hash-disclosure-vulnerability/m-p/5067386#M8945</link>
    <description>&lt;P&gt;We had a IT sec scan and came across a vulnerability with IPMI v2.0 with no fix. I assume this has to do with the CIMC, but is there a way to disabled IPMI? I see ways to possibly disable or limit on other platforms:&lt;/P&gt;&lt;P&gt;&lt;A href="https://sec.cloudapps.cisco.com/security/center/resources/ipmi_vulnerabilities.html" target="_blank" rel="noopener"&gt;https://sec.cloudapps.cisco.com/security/center/resources/ipmi_vulnerabilities.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It found this on UDP / 623.&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Synopsis&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The remote host supports IPMI version 2.0.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Description&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The remote host supports IPMI v2.0. The Intelligent Platform Management Interface (IPMI) protocol is affected by an information disclosure vulnerability due to the support of RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication. A remote attacker can obtain password hash information for valid user accounts via the HMAC from a RAKP message 2 response from a BMC.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Steps to Remediate&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;There is no patch for this vulnerability; it is an inherent problem with the specification for IPMI v2.0. Suggested mitigations include :&lt;/P&gt;&lt;P&gt;- Disabling IPMI over LAN if it is not needed.&lt;/P&gt;&lt;P&gt;- Using strong passwords to limit the successfulness of off-line dictionary attacks.&lt;/P&gt;&lt;P&gt;- Using Access Control Lists (ACLs) or isolated networks to limit access to your IPMI management interfaces.&lt;/P&gt;</description>
    <pubDate>Fri, 12 Apr 2024 15:27:18 GMT</pubDate>
    <dc:creator>frederick.mercado</dc:creator>
    <dc:date>2024-04-12T15:27:18Z</dc:date>
    <item>
      <title>IPMI v2.0 password hash disclosure Vulnerability</title>
      <link>https://community.cisco.com/t5/cisco-catalyst-center/ipmi-v2-0-password-hash-disclosure-vulnerability/m-p/5067386#M8945</link>
      <description>&lt;P&gt;We had a IT sec scan and came across a vulnerability with IPMI v2.0 with no fix. I assume this has to do with the CIMC, but is there a way to disabled IPMI? I see ways to possibly disable or limit on other platforms:&lt;/P&gt;&lt;P&gt;&lt;A href="https://sec.cloudapps.cisco.com/security/center/resources/ipmi_vulnerabilities.html" target="_blank" rel="noopener"&gt;https://sec.cloudapps.cisco.com/security/center/resources/ipmi_vulnerabilities.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It found this on UDP / 623.&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Synopsis&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The remote host supports IPMI version 2.0.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Description&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The remote host supports IPMI v2.0. The Intelligent Platform Management Interface (IPMI) protocol is affected by an information disclosure vulnerability due to the support of RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication. A remote attacker can obtain password hash information for valid user accounts via the HMAC from a RAKP message 2 response from a BMC.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Steps to Remediate&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;There is no patch for this vulnerability; it is an inherent problem with the specification for IPMI v2.0. Suggested mitigations include :&lt;/P&gt;&lt;P&gt;- Disabling IPMI over LAN if it is not needed.&lt;/P&gt;&lt;P&gt;- Using strong passwords to limit the successfulness of off-line dictionary attacks.&lt;/P&gt;&lt;P&gt;- Using Access Control Lists (ACLs) or isolated networks to limit access to your IPMI management interfaces.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Apr 2024 15:27:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cisco-catalyst-center/ipmi-v2-0-password-hash-disclosure-vulnerability/m-p/5067386#M8945</guid>
      <dc:creator>frederick.mercado</dc:creator>
      <dc:date>2024-04-12T15:27:18Z</dc:date>
    </item>
  </channel>
</rss>

