Avamar: Disabling the remote IPMI access on Gen4S hardware due to IPMI vulnerability CVE-2013-4786

Summary: This article explains how to disable the remote IPMI access on Gen4S hardware due to IPMI vulnerability CVE-2013-4786.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Symptoms

Security scans detect CVE-2013-4786 on ADS Gen4S nodes.

Cause

The Intelligent Platform Management Interface (IPMI) 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication.

This allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.

Resolution

Disable remote IPMI access by running the following commands as root:

impitool lan set 1 access off
impitool lan set 1 ipsrc static
impitool lan set 1 ipaddr 0.0.0.0 
impitool lan set 3 access off
impitool lan set 3 ipsrc static
impitool lan set 3 ipaddr 0.0.0.0
Note: The commands must be repeated on all Gen4S nodes in the grid.

Affected Products

Avamar

Products

Avamar, Avamar Data Store Gen4S
Article Properties
Article Number: 000054009
Article Type: Solution
Last Modified: 28 Oct 2025
Version:  5
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.