AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
Link | Tags |
---|---|
https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf | vendor advisory |
https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/ | press/media coverage third party advisory |
https://eclypsium.com/blog/bmc-vulnerability-cve-2024-05485-cisa-known-exploited-vulnerabilities/ | press/media coverage third party advisory |
https://security.netapp.com/advisory/ntap-20250328-0003/ | third party advisory |
https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/ | press/media coverage third party advisory |
https://www.networkworld.com/article/4013368/ami-megarac-authentication-bypass-flaw-is-being-exploitated-cisa-warns.html | press/media coverage third party advisory |
https://nvd.nist.gov/vuln/detail/CVE-2024-54085 | us government resource |