Data Domain: IPMI v2.0 Password Hash Disclosure

Summary: CVE-2013-4786 IPMI 2.0 RAKP Authentication Remote Password Hash Retrieval Vulnerability

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Symptoms

The Intelligent Platform Management Interface (IPMI) protocol is affected by an information disclosure vulnerability due to the support of RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication. A remote attacker can obtain password hash information for valid user accounts via the HMAC from a RAKP message 2 response from a BMC.

Cause

This is an inherent problem with the specification for IPMI v2.0. 
The IPMI 2.0 RAKP Authentication Remote Password Hash Retrieval vulnerability (CVE-2013-4786) was identified in the RAKP protocol and is part of the IPMI 2.0 specification.

Resolution

There is no patch for this vulnerability; 

  • Dell recommends disabling IPMI-over-LAN, which can be done via iDRAC web interface or RACADM command. 
For iDRAC web interface, login and navigate to:
System > iDRAC Settings > Network/Security > Network > IPMI Settings
Deselect  Enable IPMI Over LAN 

or

For RACADM, run the following command:

Note - You will need to SSH into the iDrac to issue the following racadm commands:

# racadm get iDRAC.IPMILan.Enable
# racadm set iDRAC.IPMILan.Enable 0

If IPMI-over-LAN is required, follow best practices as below:
  • Use strong passwords to limit the successfulness of off-line dictionary attacks.
  • Use Access Control Lists (ACLs)
  • Use isolated networks to limit access to your IPMI management interfaces.

Affected Products

Data Domain
Article Properties
Article Number: 000222162
Article Type: Solution
Last Modified: 05 Aug 2025
Version:  3
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.