CVE-2013-4786

HIGH EXPLOITED IN THE WILD RANSOMWARE

IPMI 2.0 - Info Disclosure

Title source: llm

Description

The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Dan Farmer · perlremotemultiple
https://www.exploit-db.com/exploits/38633
nomisec WORKING POC 40 stars
by fin3ss3g0d · infoleak
https://github.com/fin3ss3g0d/CosmicRakp
metasploit WORKING POC
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/ipmi/ipmi_dumphashes.rb

Scores

CVSS v3 7.5
EPSS 0.6784
EPSS Percentile 98.6%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

VulnCheck KEV 2023-02-14
InTheWild.io 2023-02-15
Ransomware Use Confirmed
CWE
CWE-255
Status published
Products (2)
intel/intelligent_platform_management_interface 2.0
oracle/fujitsu_m10_firmware < 2290
Published Jul 08, 2013
Tracked Since Feb 18, 2026