Skip to content

H3-2020-0016

Insecure IPMI Implementation

Category VULNERABILITY
Base Score 7.5

Description

The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.

Impact

Use of RAKP authentication allows an attacker to capture password hashes that may be used to gain control of the management interface of a system. This level of access potentially allows an attacker to control hardware or software at the system level.

References