IPMI Cipher Suite Zero Authentication Bypass

critical Nessus Plugin ID 68931


The remote IPMI service is affected by an authentication bypass.


The IPMI service listening on the remote system has cipher suite zero enabled, which permits logon as an administrator without requiring a password. Once logged in, a remote attacker may perform a variety of actions, including powering off the remote system.

Note that this plugin checks generically for the Cipher Suite Zero authentication bypass vulnerability using a number of common accounts.


Disable cipher suite zero or limit access to the IPMI service.

See Also


Plugin Details

Severity: Critical

ID: 68931

File Name: ipmi_cipher0_auth_bypass.nbin

Version: 1.76

Type: remote

Family: General

Published: 7/16/2013

Updated: 9/25/2023

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: Critical

Base Score: 10

Temporal Score: 9.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2013-4782


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2/22/2013

Exploitable With

Metasploit (IPMI 2.0 Cipher Zero Authentication Bypass Scanner)

Reference Information

CVE: CVE-2013-4782, CVE-2013-4783, CVE-2013-4784, CVE-2014-2955

BID: 61001, 68499

CERT: 712660