High severity7.5NVD Advisory· Published Jul 8, 2013· Updated Apr 29, 2026
CVE-2013-4786
CVE-2013-4786
Description
The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.
Affected products
2- cpe:2.3:o:oracle:fujitsu_m10_firmware:*:*:*:*:*:*:*:*Range: <=2290
- cpe:2.3:a:intel:intelligent_platform_management_interface:2.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- fish2.com/ipmi/remote-pw-cracking.htmlnvd
- marc.infonvd
- www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.htmlnvd
- community.rapid7.com/community/metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipminvd
- nvidia.custhelp.com/app/answers/detail/a_id/5010nvd
- security.netapp.com/advisory/ntap-20190919-0005/nvd
- support.hpe.com/hpsc/doc/public/displaynvd
News mentions
0No linked articles in our index yet.