Tuesday, April 22, 2025
Homecyber securitySevere AMI BMC Vulnerability Enables Remote Authentication Bypass by Attackers

Severe AMI BMC Vulnerability Enables Remote Authentication Bypass by Attackers

Published on

SIEM as a Service

Follow Us on Google News

A critical vulnerability has been discovered in AMI’s MegaRAC software, which is used in Baseboard Management Controllers (BMCs) across various server hardware.

This vulnerability, identified as CVE-2024-54085, allows attackers to bypass authentication remotely, posing a significant risk to cloud infrastructure and data centers worldwide.

The issue is a continuation of previous vulnerabilities disclosed by Eclypsium, highlighting the ongoing challenges in securing BMCs, which are crucial for remote server management.

- Advertisement - Google News

Background

The vulnerability exploits a weakness in the Redfish interface of MegaRAC, allowing unauthorized access to BMCs.

This can lead to severe consequences, including remote control of compromised servers, deployment of malware or ransomware, firmware tampering, and even physical damage to server components.

The vulnerability affects several devices, including the HPE Cray XD670 and Asus RS720A-E11-RS24U, with potentially more devices impacted due to the widespread use of AMI’s BMC software across multiple manufacturers.

A search using Shodan revealed approximately 1,000 exposed instances, indicating a substantial risk if these systems are not patched promptly.

Impact

The exploitation mechanism involves crafting specific HTTP headers to bypass authentication checks.

By manipulating the “X-Server-Addr” header, attackers can trick the system into accepting unauthorized access.

This vulnerability is particularly concerning because it can be exploited without any user interaction, and the CVSS scores reflect its high severity, with a score of 10.0 for systems exposed to the internet.

AMI has released patches for the vulnerability, but applying these fixes requires device downtime, making remediation a complex process.

Organizations are advised to ensure that all remote management interfaces are not exposed externally and to restrict internal access to authorized personnel.

Regular software and firmware updates are crucial, along with monitoring server firmware for signs of compromise.

Additionally, new equipment should be thoroughly checked for outdated firmware and potential supply chain risks.

Eclypsium’s research emphasizes the importance of robust security measures for BMCs, given their critical role in data center operations.

As no known exploits are currently observed in the wild, organizations have a window to secure their systems before potential attacks occur.

However, the ease of creating exploits once the vulnerability is understood underscores the urgency of implementing patches and security best practices.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Infostealer Attacks Surge 84% Weekly Through Phishing Emails

The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week...

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean...

New Phishing Technique Hides Weaponized HTML Files Within SVG Images

Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector...

Detecting And Blocking DNS Tunneling Techniques Using Network Analytics

DNS tunneling is a covert technique that cybercriminals use to bypass traditional network security...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Infostealer Attacks Surge 84% Weekly Through Phishing Emails

The volume of infostealer malware distributed through phishing emails has surged by 84% week-on-week...

North Korean IT Workers Use Real-Time Deepfakes to Infiltrate Organizations Through Remote Jobs

A division of Palo Alto Networks, have revealed a sophisticated scheme by North Korean...

New Phishing Technique Hides Weaponized HTML Files Within SVG Images

Cybersecurity experts have observed an alarming increase in the use of SVG (Scalable Vector...