cancel
Showing results for 
Search instead for 
Did you mean: 

Mitigating IPMI vulnerability...

sdo
Moderator
Moderator
Partner    VIP    Certified

N5230 v2.6.1.2.

Q1: I have been infiormed that the IPMI on our appliances are vulberable to a supposedly easily exploitable 'cipher zero IPMI attack'.  Is it possible to disable the IPMI features and just run it as an https port so that we can still access the useful Java KVM ?  i.e. is there a method to disable all the IPMI 2.0 related TCP and UDP ports and just leave the IPMI TCP/443/https port open ?

Q2: Our pen test also highlighted that the certificate within the https server of the IPMI is using a weak key length.  Is is possible to replace the certificate?

Thanks.

1 ACCEPTED SOLUTION

Accepted Solutions

mnolan
Level 6
Employee Accredited Certified

I believe this is the information you need.

 

IPMI Cipher Zero

Article: TECH218518
Updated: June 19, 2014 Article URL: http://www.symantec.com/docs/TECH218518

View solution in original post

3 REPLIES 3

D_Flood
Level 6

I'm guessing that the answer to Q1 is a NO since it would defeat the intended purpose of IPMI.  As for Q2 you'd probably have to convince Veritas to ask their IPMI manufacturer to release a new version of the firmware.

 

mnolan
Level 6
Employee Accredited Certified

I believe this is the information you need.

 

IPMI Cipher Zero

Article: TECH218518
Updated: June 19, 2014 Article URL: http://www.symantec.com/docs/TECH218518

sdo
Moderator
Moderator
Partner    VIP    Certified

Thank you.