cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
626
Views
0
Helpful
0
Replies

IPMI v2.0 password hash disclosure Vulnerability

frederick.mercado
Spotlight
Spotlight

We had a IT sec scan and came across a vulnerability with IPMI v2.0 with no fix. I assume this has to do with the CIMC, but is there a way to disabled IPMI? I see ways to possibly disable or limit on other platforms:

https://sec.cloudapps.cisco.com/security/center/resources/ipmi_vulnerabilities.html

It found this on UDP / 623. 

  • Synopsis

The remote host supports IPMI version 2.0.

  • Description

The remote host supports IPMI v2.0. The Intelligent Platform Management Interface (IPMI) protocol is affected by an information disclosure vulnerability due to the support of RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication. A remote attacker can obtain password hash information for valid user accounts via the HMAC from a RAKP message 2 response from a BMC.

  • Steps to Remediate

There is no patch for this vulnerability; it is an inherent problem with the specification for IPMI v2.0. Suggested mitigations include :

- Disabling IPMI over LAN if it is not needed.

- Using strong passwords to limit the successfulness of off-line dictionary attacks.

- Using Access Control Lists (ACLs) or isolated networks to limit access to your IPMI management interfaces.

0 Replies 0