IPMI Cipher Suite Zero Authentication Bypass

Critical Nessus Plugin ID 68931

Synopsis

The remote IPMI service is affected by an authentication bypass.

Description

The IPMI service listening on the remote system has cipher suite zero enabled, which permits logon as an administrator without requiring a password. Once logged in, a remote attacker may perform a variety of actions, including powering off the remote system.

Note that this plugin checks generically for the Cipher Suite Zero authentication bypass vulnerability using a number of common accounts.

Solution

Disable cipher suite zero or limit access to the IPMI service.

See Also

http://fish2.com/ipmi/cipherzero.html

Plugin Details

Severity: Critical

ID: 68931

File Name: ipmi_cipher0_auth_bypass.nbin

Version: $Revision: 1.35 $

Type: remote

Family: General

Published: 2013/07/16

Modified: 2018/08/15

Dependencies: 45555, 10870

Risk Information

Risk Factor: Critical

CVSSv2

Base Score: 10

Temporal Score: 9.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2013/02/22

Exploitable With

Metasploit (IPMI 2.0 Cipher Zero Authentication Bypass Scanner)

Reference Information

CVE: CVE-2013-4782, CVE-2013-4783, CVE-2013-4784, CVE-2014-2955

BID: 61001, 68499

CERT: 712660