Preview Tool

Cisco Bug: CSCuj84245 - UCS-C IPMI RAKP allows remote attackers to obtain password hashes

Last Modified

Oct 06, 2020

Products (1)

  • Cisco Unified Computing System

Known Affected Releases


Description (partial)

A vulnerability in the IPMI 2.0 specification used by Cisco Integrated Management Controller could allow an authenticated, remote attacker to conduct offline password guessing attacks.

The vulnerability is due to improper security restrictions provided by the RMCP Authenticated Key-Exchange (RAKP) Protocol. An authenticated, remote attacker could exploit the vulnerability by sending malicious authentication requests to the IPMI 2.0 protocol. Successful exploitation could allow the attacker to bypass authentication and gain unauthorized access to  the system, which could be used to conduct further attacks.

Cisco IMC running with IPMI Enabled.
Bug details contain sensitive information and therefore require a account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.