Vulnerability Description
Buffer overflow in logout.cgi in the Intelligent Platform Management Interface (IPMI) with firmware before 3.15 (SMT_X9_315) on Supermicro X9 generation motherboards allows remote authenticated users to execute arbitrary code via the SID parameter.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Supermicro | Intelligent Platform Management Firmware | <= 2.26 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/64259
- https://community.rapid7.com/community/metasploit/blog/2013/11/06/supermicro-ipmExploit
- https://support.citrix.com/article/CTX216642
- http://www.securityfocus.com/bid/64259
- https://community.rapid7.com/community/metasploit/blog/2013/11/06/supermicro-ipmExploit
- https://support.citrix.com/article/CTX216642
FAQ
What is CVE-2013-3622?
CVE-2013-3622 is a vulnerability with a CVSS score of 9.0 (HIGH). Buffer overflow in logout.cgi in the Intelligent Platform Management Interface (IPMI) with firmware before 3.15 (SMT_X9_315) on Supermicro X9 generation motherboards allows remote authenticated users ...
How severe is CVE-2013-3622?
CVE-2013-3622 has been rated HIGH with a CVSS base score of 9.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-3622?
Check the references section above for vendor advisories and patch information. Affected products include: Supermicro Intelligent Platform Management Firmware.