⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.

CVE-2013-4786Oracle Fujitsu M10 Firmware vulnerability

CWE-2559 documents7 sources
Severity
7.5HIGHNVD
EPSS
67.8%
top 1.41%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedJul 8
Latest updateMay 13

Description

The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

🔴Vulnerability Details

3
GHSA
GHSA-5qfx-g363-pvpg: The IPMI 22022-05-13
CVEList
CVE-2013-4786: The IPMI 22013-07-08
VulnCheck
IPMI 2.0 RMCP+ Authenticated Key-Exchange Protocol (RAKP) Security Bypass2013

💥Exploits & PoCs

1
Exploit-DB
Intelligent Platform Management Interface - Information Disclosure2013-07-02

📋Vendor Advisories

1
Red Hat
freeipmi: Leakage of password hashes via RAKP authentication2013-07-08

💬Community

3
Bugzilla
CVE-2013-4786 OpenIPMI, freeipmi: Leakage of password hashes via RAKP authentication2016-04-13
Bugzilla
CVE-2013-4786 OpenIPMI: freeipmi: Leakage of password hashes via RAKP authentication [fedora-all]2016-04-13
Bugzilla
CVE-2013-4786 OpenIPMI: freeipmi: Leakage of password hashes via RAKP authentication [fedora-all]2016-04-13
CVE-2013-4786 — Oracle vulnerability | cvebase