| Id |
Log ID |
Jvninfo Id |
Plugin ID |
CVE |
CVSS |
Risk |
Host |
Protocol |
Port |
Name |
Synopsis |
Description |
Solution |
See Also |
Plugin Output |
Actions |
| 21910 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.1 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 21953 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.10 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22059 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.15 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22102 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.20 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22144 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.22 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22187 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.25 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22238 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.3 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22280 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.32 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22322 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.34 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22365 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.63 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22408 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.65 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22452 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.66 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22495 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.68 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22538 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-1-20161128-soga_667489456.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.69 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22621 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.11 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22701 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.16 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22744 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.2 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22787 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.21 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22830 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.26 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22873 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.33 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22916 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.35 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 22959 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.64 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 23002 |
nessus_H28-MOJ-Teikyo-Nara-18-seg-2-20161128-soga_730442296.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.202.67 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 45887 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.1 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 45930 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.10 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46110 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.15 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46154 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.20 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46197 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.25 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46248 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.32 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46291 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.33 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46334 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.63 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46377 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.65 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46420 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.66 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46463 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.68 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46506 |
H28-MOJ-Teikyo-Yokohama-19-Seg-1-161121-Endo_v6lf04.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.69 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46569 |
H28-MOJ-Teikyo-Yokohama-19-Seg-2-161121-Endo_nksyu2.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.11 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46612 |
H28-MOJ-Teikyo-Yokohama-19-Seg-2-161121-Endo_nksyu2.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.16 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46655 |
H28-MOJ-Teikyo-Yokohama-19-Seg-2-161121-Endo_nksyu2.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.2 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46698 |
H28-MOJ-Teikyo-Yokohama-19-Seg-2-161121-Endo_nksyu2.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.26 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46741 |
H28-MOJ-Teikyo-Yokohama-19-Seg-2-161121-Endo_nksyu2.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.67 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46784 |
H28-MOJ-Teikyo-Yokohama-19-Seg-3-161121-Endo_340kd4.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.17 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46827 |
H28-MOJ-Teikyo-Yokohama-19-Seg-3-161121-Endo_340kd4.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.3 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46870 |
H28-MOJ-Teikyo-Yokohama-19-Seg-3-161121-Endo_c0h4ua.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.17 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46913 |
H28-MOJ-Teikyo-Yokohama-19-Seg-3-161121-Endo_c0h4ua.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.3 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46956 |
H28-MOJ-Teikyo-Yokohama-19-Seg-4-161121-Endo_qehd9k.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.4 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 46999 |
H28-MOJ-Teikyo-Yokohama-19-Seg-5-161121-Endo_7i2nah.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.5 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 47042 |
H28-MOJ-Teikyo-Yokohama-19-Seg-6-161121-Endo_fu4jjd.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.21 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 47085 |
H28-MOJ-Teikyo-Yokohama-19-Seg-6-161121-Endo_fu4jjd.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.22 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 47128 |
H28-MOJ-Teikyo-Yokohama-19-Seg-6-161121-Endo_fu4jjd.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.34 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 47171 |
H28-MOJ-Teikyo-Yokohama-19-Seg-6-161121-Endo_fu4jjd.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.35 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 47214 |
H28-MOJ-Teikyo-Yokohama-19-Seg-6-161121-Endo_fu4jjd.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.139.64 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 48884 |
H28-MOJ-Teikyo-Makuhari-4-Seg-4-161124-w510.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.162.162 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|
| 49398 |
H28-MOJ-Teikyo-Shinkawa-4-Seg-1-161122-w510.csv |
40316 |
80101 |
CVE-2013-4786 |
7.8 |
High |
172.30.152.162 |
udp |
623 |
IPMI v2.0 Password Hash Disclosure |
The remote host supports IPMI version 2.0. |
The remote host supports IPMI v2.0. The Intelligent Platform
Management Interface (IPMI) protocol is affected by an information
disclosure vulnerability due to the support of RMCP+ Authenticated
Key-Exchange Protocol (RAKP) authentication. A remote attacker can
obtain password hash information for valid user accounts via the HMAC
from a RAKP message 2 response from a BMC. |
There is no patch for this vulnerability; it is an inherent problem
with the specification for IPMI v2.0. Suggested mitigations include :
- Disabling IPMI over LAN if it is not needed.
- Using strong passwords to limit the successfulness of
off-line dictionary attacks.
- Using Access Control Lists (ACLs) or isolated networks
to limit access to your IPMI management interfaces. |
http://fish2.com/ipmi/remote-pw-cracking.html |
Nessus detected that the remote server has IPMI v2.0 implemented. Remote unauthenticated users will be able to get password hashes for valid users. |
|