IPMI Cipher Suite Zero Authentication Bypass

critical Nessus Plugin ID 68931

Synopsis

The remote IPMI service is affected by an authentication bypass.

Description

The IPMI service listening on the remote system has cipher suite zero enabled, which permits logon as an administrator without requiring a password. Once logged in, a remote attacker may perform a variety of actions, including powering off the remote system.

Note that this plugin checks generically for the Cipher Suite Zero authentication bypass vulnerability using a number of common accounts.

Solution

Disable cipher suite zero or limit access to the IPMI service.

See Also

http://fish2.com/ipmi/cipherzero.html

Plugin Details

Severity: Critical

ID: 68931

File Name: ipmi_cipher0_auth_bypass.nbin

Version: 1.80

Type: remote

Family: General

Published: 7/16/2013

Updated: 7/17/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 9.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2013-4782

CVSS v3

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2/22/2013

Exploitable With

Metasploit (IPMI 2.0 Cipher Zero Authentication Bypass Scanner)

Reference Information

CVE: CVE-2013-4782, CVE-2013-4783, CVE-2013-4784, CVE-2014-2955

BID: 61001, 68499

CERT: 712660