Vulnerability Description
The Supermicro BMC implementation allows remote attackers to bypass authentication and execute arbitrary IPMI commands by using cipher suite 0 (aka cipher zero) and an arbitrary password.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Supermicro | Bmc | All versions |
Related Weaknesses (CWE)
References
- http://fish2.com/ipmi/cipherzero.html
- http://osvdb.org/show/osvdb/93038
- http://www.metasploit.com/modules/auxiliary/scanner/ipmi/ipmi_cipher_zero
- http://www.wired.com/threatlevel/2013/07/ipmi/
- https://lists.gnu.org/archive/html/freeipmi-devel/2013-02/msg00013.html
- http://fish2.com/ipmi/cipherzero.html
- http://osvdb.org/show/osvdb/93038
- http://www.metasploit.com/modules/auxiliary/scanner/ipmi/ipmi_cipher_zero
- http://www.wired.com/threatlevel/2013/07/ipmi/
- https://lists.gnu.org/archive/html/freeipmi-devel/2013-02/msg00013.html
FAQ
What is CVE-2013-4782?
CVE-2013-4782 is a vulnerability with a CVSS score of 10.0 (HIGH). The Supermicro BMC implementation allows remote attackers to bypass authentication and execute arbitrary IPMI commands by using cipher suite 0 (aka cipher zero) and an arbitrary password.
How severe is CVE-2013-4782?
CVE-2013-4782 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4782?
Check the references section above for vendor advisories and patch information. Affected products include: Supermicro Bmc.