If the system was purchased directly from the company, go back to the salesperson and ask them why the documentation wasn't included.
If the system was purchased from a reseller, go back to them and ask why they didn't include the documentation that ships with it.
If the system is truly brand new and you are the first person to own it, then you have a warranty...
A warranty gives you credentials that let you log a SR with technical support. Do that, and ask TechSupport for help.
You might also choose to get all the PDF documents related to that box, and make yourself an archived library for it:
That is the default LOM root password - not the o/s root password.
These servers have DVD drives and often USB ports. So solution is simple. Create a boot USB/DVD, boot from it, mount the local ext3/4 root file system of that server and hack /etc/shadow.
If you have access to the system console the solution is easy:
Just press any key to enter the Grub boot menu.
Then add an uppercase letter S to the end of the kernel line to start into single user mode.
Then simply type passwd to change the root password to whatever you want.
Single user mode on newer kernels refuses to drop to shell without the root password in my experience. Unless the root file system is damaged and not mounted (which means no /etc/shadow access).
I know some commercial Unix systems don't, but it works fine under Oracle Linux 5 and 6. I just tested it.
And just for the record, it also works in OEL 4.8.
Configuring kernel parameters:
Setting hostname to vm041.example.com
Checking root filesystem
Remounting root filesystem in read-write mode:
Enabling swap space:
Changing password for user root.
New UNIX password:
sh-3.00# uname -r
You can try some default passwords like, changeme, root123, root.
If not then you can check on google how to reset root password and you will find step by step document.