H3-2020-0016
Insecure IPMI Implementation
Category | VULNERABILITY |
Base Score | 7.5 |
Description
The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.
Impact
Use of RAKP authentication allows an attacker to capture password hashes that may be used to gain control of the management interface of a system. This level of access potentially allows an attacker to control hardware or software at the system level.