| Title | 複数の IBM サーバ製品上で稼働する Integrated Management Module におけるアクセス権を取得される脆弱性 |
|---|---|
| Summary | 複数の IBM サーバ製品上で稼働する Integrated Management Module (IMM) および Integrated Management Module II (IMM2) の Intelligent Platform Management Interface (IPMI) の実装の RAKP プロトコルサポートは、クライアントにパスワードハッシュを送信するため、アクセス権を取得される脆弱性が存在します。 |
| Possible impacts | 第三者により、総当たり攻撃 (Brute force attack) を介して、アクセス権を取得される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | Aug. 1, 2013, midnight |
| Registration Date | Aug. 13, 2013, 3:24 p.m. |
| Last Update | Aug. 13, 2013, 3:24 p.m. |
| CVSS2.0 : 警告 | |
| Score | 4.3 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:N/I:P/A:N |
| IBM |
| IBM BladeCenter HS22 |
| IBM BladeCenter HS22V |
| IBM BladeCenter HS23 |
| IBM BladeCenter HS23E |
| IBM BladeCenter HX5 |
| IBM Flex System x220 Compute Node |
| IBM Flex System x240 Compute Node |
| IBM Flex System x440 Compute Node |
| IBM System x iDataPlex dx360 M2 |
| IBM System x iDataPlex dx360 M3 |
| IBM System x iDataPlex dx360 M4 |
| IBM System x3100 M4 |
| IBM System x3200 M3 |
| IBM System x3250 M3 |
| IBM System x3250 M4 |
| IBM System x3400 M2 |
| IBM System x3400 M3 |
| IBM System x3500 M2 |
| IBM System x3500 M3 |
| IBM System x3500 M4 |
| IBM System x3530 M4 |
| IBM System x3550 M2 |
| IBM System x3550 M3 |
| IBM System x3550 M4 |
| IBM System x3620 M3 |
| IBM System x3630 M3 |
| IBM System x3630 M4 |
| IBM System x3650 M2 |
| IBM System x3650 M3 |
| IBM System x3650 M4 |
| IBM System x3690 X5 |
| IBM System x3750 M4 |
| IBM System x3850 X5 |
| IBM System x3950 X5 |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2013年08月13日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
| Summary | The RAKP protocol support in the Intelligent Platform Management Interface (IPMI) implementation in Integrated Management Module (IMM) and Integrated Management Module II (IMM2) on IBM BladeCenter, Flex System, System x iDataPlex, and System x3### servers sends a password hash to the client, which makes it easier for remote attackers to obtain access via a brute-force attack. |
|---|---|
| Publication Date | Aug. 10, 2013, 8:55 a.m. |
| Registration Date | Jan. 26, 2021, 3:42 p.m. |
| Last Update | Nov. 21, 2024, 10:54 a.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:h:ibm:system_x3500_m3:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:flex_system_x440_compute_node:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3250_m4:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3550_m3:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3400_m2:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:bladecenter:hs22v:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3550_m2:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3750_m4:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3650_m2:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3200_m3:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:bladecenter:hs23e:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3250_m3:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:bladecenter:hs23:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3850_x5:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3650_m3:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3630_m3:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3950_x5:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:bladecenter:hx5:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3500_m2:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3100_m4:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x_idataplex_dx360_m4_server:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x_idataplex_dx360_m2_server:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:flex_system_x220_compute_node:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3400_m3:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3500_m4:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3630_m4:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x_idataplex_dx360_m3_server:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3690_x5:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:flex_system_x240_compute_node:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:bladecenter:hs22:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3650_m4:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3550_m4:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3530_m4:-:*:*:*:*:*:*:* | |||||
| cpe:2.3:h:ibm:system_x3620_m3:-:*:*:*:*:*:*:* | |||||