Avamar: Disabling the remote IPMI access on Gen4S hardware due to IPMI vulnerability CVE-2013-4786
Summary: This article explains how to disable the remote IPMI access on Gen4S hardware due to IPMI vulnerability CVE-2013-4786.
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Symptoms
Security scans detect CVE-2013-4786 on ADS Gen4S nodes.
Cause
The Intelligent Platform Management Interface (IPMI) 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication.
This allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.
Resolution
Disable remote IPMI access by running the following commands as root:
impitool lan set 1 access off
impitool lan set 1 ipsrc static
impitool lan set 1 ipaddr 0.0.0.0
impitool lan set 3 access off
impitool lan set 3 ipsrc static
impitool lan set 3 ipaddr 0.0.0.0
Note: The commands must be repeated on all Gen4S nodes in the grid.
Affected Products
AvamarProducts
Avamar, Avamar Data Store Gen4SArticle Properties
Article Number: 000054009
Article Type: Solution
Last Modified: 28 Oct 2025
Version: 5
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.