The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC. (CVE-2013-4786)
Impact
This vulnerability may allow remote attackers to obtain password hashes and conduct offline password guessing attacks.
In the default configuration, Intelligent Platform Management Interface (IPMI) protocol is disabled for external hosts on BIG-IP platforms. The following iSeries platforms are vulnerable when you configure the Always-On Management (AOM) network and enable IPMI access and configure a user. F5 recommends that you do not enable IPMI protocol on the following BIG-IP iSeries platforms:
CPE | Name | Operator | Version |
---|---|---|---|
big-ip afm | eq | 11.3.0 | |
big-ip afm | eq | 11.4.0 | |
big-ip afm | eq | 11.4.1 | |
big-ip afm | eq | 11.5.0 | |
big-ip afm | eq | 11.5.1 | |
big-ip afm | eq | 11.5.2 | |
big-ip afm | eq | 11.5.3 | |
big-ip afm | eq | 11.5.4 | |
big-ip afm | eq | 11.6.0 | |
big-ip afm | eq | 11.6.1 |