Id |
Log ID |
Jvninfo Id |
Plugin ID |
CVE |
CVSS |
Risk |
Host |
Protocol |
Port |
Name |
Synopsis |
Description |
Solution |
See Also |
Plugin Output |
Actions |
21910 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.1 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
21953 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.10 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22059 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.15 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22102 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.20 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22144 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.22 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22187 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.25 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22238 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.3 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22280 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.32 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22322 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.34 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22365 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.63 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22408 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.65 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22452 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.66 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22495 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.68 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22538 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.69 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22621 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.11 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22701 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.16 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22744 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.2 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22787 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.21 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22830 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.26 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22873 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.33 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22916 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.35 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
22959 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.64 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
23002 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.67 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
45887 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.1 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
45930 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.10 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46110 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.15 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46154 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.20 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46197 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.25 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46248 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.32 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46291 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.33 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46334 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.63 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46377 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.65 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46420 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.66 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46463 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.68 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46506 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.69 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46569 |
H28-MOJ-Teikyo-Yokohama-19-Seg-2-161121-Endo_nksyu2.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.11 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46612 |
H28-MOJ-Teikyo-Yokohama-19-Seg-2-161121-Endo_nksyu2.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.16 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46655 |
H28-MOJ-Teikyo-Yokohama-19-Seg-2-161121-Endo_nksyu2.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.2 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46698 |
H28-MOJ-Teikyo-Yokohama-19-Seg-2-161121-Endo_nksyu2.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.26 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46741 |
H28-MOJ-Teikyo-Yokohama-19-Seg-2-161121-Endo_nksyu2.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.67 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46784 |
H28-MOJ-Teikyo-Yokohama-19-Seg-3-161121-Endo_340kd4.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.17 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46827 |
H28-MOJ-Teikyo-Yokohama-19-Seg-3-161121-Endo_340kd4.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.3 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46870 |
H28-MOJ-Teikyo-Yokohama-19-Seg-3-161121-Endo_c0h4ua.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.17 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46913 |
H28-MOJ-Teikyo-Yokohama-19-Seg-3-161121-Endo_c0h4ua.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.3 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46956 |
H28-MOJ-Teikyo-Yokohama-19-Seg-4-161121-Endo_qehd9k.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.4 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
46999 |
H28-MOJ-Teikyo-Yokohama-19-Seg-5-161121-Endo_7i2nah.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.5 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
47042 |
H28-MOJ-Teikyo-Yokohama-19-Seg-6-161121-Endo_fu4jjd.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.21 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
47085 |
H28-MOJ-Teikyo-Yokohama-19-Seg-6-161121-Endo_fu4jjd.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.22 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
47128 |
H28-MOJ-Teikyo-Yokohama-19-Seg-6-161121-Endo_fu4jjd.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.34 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
47171 |
H28-MOJ-Teikyo-Yokohama-19-Seg-6-161121-Endo_fu4jjd.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.35 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
47214 |
H28-MOJ-Teikyo-Yokohama-19-Seg-6-161121-Endo_fu4jjd.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.64 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
48884 |
H28-MOJ-Teikyo-Makuhari-4-Seg-4-161124-w510.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.162.162 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
49398 |
H28-MOJ-Teikyo-Shinkawa-4-Seg-1-161122-w510.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.152.162 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|