IPMI Cipher Suite Zero Authentication Bypass

critical Nessus Plugin ID 68931
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote IPMI service is affected by an authentication bypass.

Description

The IPMI service listening on the remote system has cipher suite zero enabled, which permits logon as an administrator without requiring a password. Once logged in, a remote attacker may perform a variety of actions, including powering off the remote system.

Note that this plugin checks generically for the Cipher Suite Zero authentication bypass vulnerability using a number of common accounts.

Solution

Disable cipher suite zero or limit access to the IPMI service.

See Also

http://fish2.com/ipmi/cipherzero.html

Plugin Details

Severity: Critical

ID: 68931

File Name: ipmi_cipher0_auth_bypass.nbin

Version: 1.57

Type: remote

Family: General

Published: 7/16/2013

Updated: 7/12/2021

Dependencies: asf_rmcp_detect.nbin, logins.nasl

Risk Information

CVSS Score Source: CVE-2013-4782

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 9.5

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:F/RL:U/RC:ND

CVSS v3

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

Excluded KB Items: global_settings/supplied_logins_only

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2/22/2013

Exploitable With

Metasploit (IPMI 2.0 Cipher Zero Authentication Bypass Scanner)

Reference Information

CVE: CVE-2013-4782, CVE-2013-4783, CVE-2013-4784, CVE-2014-2955

BID: 61001, 68499

CERT: 712660