93040 : HP Integrated Lights-Out (iLO) IPMI Cipher Zero Unauthenticated Remote Admin Access
Printer | http://osvdb.org/93040 | Email This | Edit Vulnerability

Views This Week Views All Time Added to OSVDB Last Modified Modified (since 2008) Percent Complete
40 2275 12 months ago about 1 month ago 26 times 100%

Timeline

Disclosure Date
2013-02-22
Days of Exposure
159 days

Description

HP Integrated Lights-Out (iLO) contains a flaw related to the Intelligent Platform Management Interface (IPMI) implementation. The issue is due to the vendor shipping their devices with the cipher suite '0' (aka 'cipher zero') enabled. This allows a remote attacker to authenticate to the IPMI interface using an arbitrary password. The only information required is a valid account, but most vendors ship with a default 'admin' account. This would allow an attacker to have full control over the IPMI functionality, including machines that may be powered down.

Classification

Location: Remote / Network Access
Attack Type: Authentication Management
Impact: Loss of Integrity
Solution: Workaround, Upgrade
Exploit: Exploit Public
Disclosure: Vendor Verified, Uncoordinated Disclosure

Solution

It has been reported that this issue has been fixed. Upgrade iLO3 to version 1.60, or higher, and iLO4 to version 1.30, or higher, to address this vulnerability.

Products

Hewlett-Packard Development Company, L.P.
Integrated Lights-Out 3
4
McAfee, Inc.
EWS3200
Unspecified
EWS3300
Unspecified
EWS3400
Unspecified
E2200
Unspecified
E5200
Unspecified
EG5000
Unspecified
EG5500
Unspecified
Content Security Blade Server (CSBS)
Unspecified
MVM3100
Unspecified
MVM3000
Unspecified
Check Point Software Technologies Ltd.
IAS D-Series Appliances
Unspecified

References

Credit

CVSSv2 Score

CVSSv2 Base Score = 9.0
Source: nvd.nist.gov | Generated: 2013-08-05 | Disagree? | There are 2 more: View All

Access_vector_2 Access_complexity_2 Authentication_2 Confidentiality_impact_1 Integrity_impact_1 Availability_impact_2

Comments

Anonymous - 2013/07/26 04:53:35

20130725 ILO3 and ILO4 are both vulnerable with up to date firmware, no matter if you secure your accounts with a daunting password. To know a valid account is sufficient!

Anonymous - 2013/08/26 14:22:56

@anonymous: your comment is useless without a real version number. Credibility score = 0.0


The database information may change without any notice. Use of the information constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the copyright holder or distributor (OSVDB or OSF) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

© Copyright 2002 - 2014 Open Sourced Vulnerability Database (OSVDB), All Rights Reserved.
License - Privacy Statement - Terms of Use