Wednesday, March 19, 2025
Homecyber securitySevere AMI BMC Vulnerability Enables Remote Authentication Bypass by Attackers

Severe AMI BMC Vulnerability Enables Remote Authentication Bypass by Attackers

Published on

SIEM as a Service

Follow Us on Google News

A critical vulnerability has been discovered in AMI’s MegaRAC software, which is used in Baseboard Management Controllers (BMCs) across various server hardware.

This vulnerability, identified as CVE-2024-54085, allows attackers to bypass authentication remotely, posing a significant risk to cloud infrastructure and data centers worldwide.

The issue is a continuation of previous vulnerabilities disclosed by Eclypsium, highlighting the ongoing challenges in securing BMCs, which are crucial for remote server management.

Background

The vulnerability exploits a weakness in the Redfish interface of MegaRAC, allowing unauthorized access to BMCs.

This can lead to severe consequences, including remote control of compromised servers, deployment of malware or ransomware, firmware tampering, and even physical damage to server components.

The vulnerability affects several devices, including the HPE Cray XD670 and Asus RS720A-E11-RS24U, with potentially more devices impacted due to the widespread use of AMI’s BMC software across multiple manufacturers.

A search using Shodan revealed approximately 1,000 exposed instances, indicating a substantial risk if these systems are not patched promptly.

Impact

The exploitation mechanism involves crafting specific HTTP headers to bypass authentication checks.

By manipulating the “X-Server-Addr” header, attackers can trick the system into accepting unauthorized access.

This vulnerability is particularly concerning because it can be exploited without any user interaction, and the CVSS scores reflect its high severity, with a score of 10.0 for systems exposed to the internet.

AMI has released patches for the vulnerability, but applying these fixes requires device downtime, making remediation a complex process.

Organizations are advised to ensure that all remote management interfaces are not exposed externally and to restrict internal access to authorized personnel.

Regular software and firmware updates are crucial, along with monitoring server firmware for signs of compromise.

Additionally, new equipment should be thoroughly checked for outdated firmware and potential supply chain risks.

Eclypsium’s research emphasizes the importance of robust security measures for BMCs, given their critical role in data center operations.

As no known exploits are currently observed in the wild, organizations have a window to secure their systems before potential attacks occur.

However, the ease of creating exploits once the vulnerability is understood underscores the urgency of implementing patches and security best practices.

Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

mySCADA myPRO RCE Vulnerabilities Expose ICS Devices to Remote Control

Supervisory Control and Data Acquisition (SCADA) systems play a pivotal role in managing critical...

SpyCloud’s 2025 Identity Exposure Report Reveals the Scale and Hidden Risks of Digital Identity Threats

The average corporate user now has 146 stolen records linked to their identity, an...

Sante PACS Server Flaws Allow Remote Attackers to Download Arbitrary Files

Recently, several critical vulnerabilities were discovered in Sante PACS Server version 4.1.0, leaving it...

Attackers Hide Malicious Word Files Inside PDFs to Evade Detection

A newly identified cybersecurity threat involves attackers embedding malicious Word files within PDFs to...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

mySCADA myPRO RCE Vulnerabilities Expose ICS Devices to Remote Control

Supervisory Control and Data Acquisition (SCADA) systems play a pivotal role in managing critical...

Sante PACS Server Flaws Allow Remote Attackers to Download Arbitrary Files

Recently, several critical vulnerabilities were discovered in Sante PACS Server version 4.1.0, leaving it...

Attackers Hide Malicious Word Files Inside PDFs to Evade Detection

A newly identified cybersecurity threat involves attackers embedding malicious Word files within PDFs to...