Raritan PX before 1.5.11 on DPXR20A-16 devices allows remote attackers to bypass authentication and execute arbitrary IPMI commands by using cipher suite 0 (aka cipher zero) and an arbitrary password.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Px | Raritan | * | 1.5.8 (including) |
Px | Raritan | 1.0 (including) | 1.0 (including) |
Px | Raritan | 1.0.4 (including) | 1.0.4 (including) |
Px | Raritan | 1.1 (including) | 1.1 (including) |
Px | Raritan | 1.1.6 (including) | 1.1.6 (including) |
Px | Raritan | 1.2 (including) | 1.2 (including) |
Px | Raritan | 1.2.5 (including) | 1.2.5 (including) |
Px | Raritan | 1.2.7 (including) | 1.2.7 (including) |
Px | Raritan | 1.3 (including) | 1.3 (including) |
Px | Raritan | 1.3.1 (including) | 1.3.1 (including) |
Px | Raritan | 1.3.5 (including) | 1.3.5 (including) |
Px | Raritan | 1.4.1 (including) | 1.4.1 (including) |
Px | Raritan | 1.5 (including) | 1.5 (including) |
Px | Raritan | 1.5.4 (including) | 1.5.4 (including) |
Px | Raritan | 1.5.7 (including) | 1.5.7 (including) |