Solved

IPMI Cipher Zero vulnerability on server 2012?

Posted on 2016-09-19
1
67 Views
Last Modified: 2016-10-06
I got a vulnerability report stating that my server 2012 has the ipmi cipher vuln but its pointing to my server address and not the idrac. Any idea if a server can have this vulnerability?
0
Comment
Question by:Larry Kiterling
1 Comment
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 41805870
should not be the win server since it is not running ipmi, even though it is hosted by the dell idrac
https://nmap.org/nsedoc/scripts/ipmi-cipher-zero.html
You can test using nmap
nmap -sU --script ipmi-cipher-zero -p 623 <host>

PORT      STATE         SERVICE REASON
623/udp open|filtered unknown no-response
| ipmi-cipher-zero:
|   VULNERABLE:
|   IPMI 2.0 RAKP Cipher Zero Authentication Bypass
|     State: VULNERABLE
|     Risk factor: High
|     Description:
or ipmitool
$ ipmitool -I lanplus -H 10.0.0.99 -U Administrator -P FluffyWabbit user list
Error: Unable to establish IPMI v2 / RMCP+ session
Get User Access command failed (channel 14, user 1)

$ ipmitool -I lanplus -C 0 -H 10.0.0.99 -U Administrator -P FluffyWabbit user list

ID  Name        Callin  Link Auth    IPMI Msg  Channel Priv Limit
1  Administrator    true    false      true      ADMINISTRATOR
2  (Empty User)    true    false      false      NO ACCESS
https://community.rapid7.com/community/metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipmi
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Windows 2012 R2 Evaluation 4 27
AD architecture diagram 5 35
Domain trust created by PDC name 6 35
Window update errors on VMs 9 22
Read about achieving the basic levels of HRIS security in the workplace.
This article explains how to install and use the NTBackup utility that comes with Windows Server.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…

861 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question