Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Act 2 of Drive Capital – How Columbus Ventures Success After Split

Don’t ask the blue ski toll ruble, it’s a toll for you

Taiwan NSB warns the public about the risks of data reintroducing Tiktok, Waibo and Chinese ties

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New critical AMI BMC vulnerabilities allow takeover and bricking of remote servers
Identity

New critical AMI BMC vulnerabilities allow takeover and bricking of remote servers

userBy userMarch 18, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 18, 2025Ravi LakshmananVulnerability/Firmware Security

AMI BMC Vulnerability

AMI’s Megarac Baseboard Management Controller (BMC) software reveals a critical security vulnerability that allows attackers to bypass authentication and take post-exposure actions.

The vulnerability tracked as CVE-2024-54085 is equipped with a CVSS V4 score of 10.0, indicating maximum severity.

“Local or remote attackers can take advantage of the vulnerability by accessing an internal host on a remote management interface (Redfish) or a BMC interface (Redfish),” firmware security company Eclypsium said in a report shared with Hacker News.

“By exploiting this vulnerability, an attacker can remotely control a compromised server, allowing malware, ransomware, firmware tampering, bridging motherboard components (BMC or potentially BIOS/UEFI), potential server physical damage (overvoltage/bricking), and victim reboot loops.

Additionally, vulnerabilities can be weaponized to phase out destructive attacks, and by sending malicious commands, sensitive devices will be rebooted continuously. This could pave the way for indefinite downtime until the device is reconfigured.

Cybersecurity

CVE-2024-54085 is the latest list of long list of security drawbacks discovered in Ami Megarac BMC since December 2022.

Eclypsium pointed out that CVE-2024-54085 is similar to CVE-2023-34329. The vulnerability has been found to affect the following devices:

HPE Cray XD670 ASUS RS720A-E11-RS24U ASROCKRACK

AMI has released a patch to address the defects as of March 11, 2025. There is no evidence that the issue has been exploited in the wild, but it is essential that downstream users update the system once OEM vendors incorporate these fixes and release them to customers.

“Please note that patching these vulnerabilities is a non-trivial exercise and requires downtime on the device,” Eclypsium said. “The vulnerability affects AMI’s BMC software stack only. However, since AMI is at the top of the BIOS supply chain, the downstream impact will affect 12 manufacturers.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleGoogle acquires cloud security startup Wiz for $32 billion. This is the biggest deal ever
Next Article Vote for the speaker you want to watch in the session: ai
user
  • Website

Related Posts

Taiwan NSB warns the public about the risks of data reintroducing Tiktok, Waibo and Chinese ties

July 5, 2025

The exposed JDWP interface leads to crypto mining, and Hpingbot targets DDO’s SSH

July 5, 2025

TwinH: A New Frontier in the Pursuit of Immortality?

July 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Act 2 of Drive Capital – How Columbus Ventures Success After Split

Don’t ask the blue ski toll ruble, it’s a toll for you

Taiwan NSB warns the public about the risks of data reintroducing Tiktok, Waibo and Chinese ties

The exposed JDWP interface leads to crypto mining, and Hpingbot targets DDO’s SSH

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.