Cisco Bug: CSCuj84245 - UCS-C IPMI RAKP allows remote attackers to obtain password hashes
Oct 06, 2020
- Cisco Unified Computing System
Known Affected Releases
Symptom: A vulnerability in the IPMI 2.0 specification used by Cisco Integrated Management Controller could allow an authenticated, remote attacker to conduct offline password guessing attacks. The vulnerability is due to improper security restrictions provided by the RMCP Authenticated Key-Exchange (RAKP) Protocol. An authenticated, remote attacker could exploit the vulnerability by sending malicious authentication requests to the IPMI 2.0 protocol. Successful exploitation could allow the attacker to bypass authentication and gain unauthorized access to the system, which could be used to conduct further attacks. <B>Conditions:</B> Cisco IMC running with IPMI Enabled.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases