CVE-2013-4786
HIGH EXPLOITED IN THE WILD RANSOMWAREIPMI 2.0 - Info Disclosure
Title source: llmDescription
The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Dan Farmer · perlremotemultiple
https://www.exploit-db.com/exploits/38633
metasploit
WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/ipmi/ipmi_dumphashes.rb
References (7)
Scores
CVSS v3
7.5
EPSS
0.6784
EPSS Percentile
98.6%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2023-02-14
InTheWild.io
2023-02-15
Ransomware Use
Confirmed
CWE
CWE-255
Status
published
Products (2)
intel/intelligent_platform_management_interface
2.0
oracle/fujitsu_m10_firmware
< 2290
Published
Jul 08, 2013
Tracked Since
Feb 18, 2026