Authentication Bypass Vulnerability in AMIās SPx Management Controller
CVE-2024-54085
Key Information:
- Vendor
Ami
- Status
- Vendor
- CVE Published:
- 11 March 2025
Badges
What is CVE-2024-54085?
CVE-2024-54085 is an authentication bypass vulnerability present in AMIās SPx Management Controller. This product is utilized to manage server hardware and provides a crucial interface for systems management. The vulnerability allows an attacker to remotely bypass authentication protocols via the Redfish Host Interface, significantly threatening the security posture of organizations using this technology. If exploited, it could lead to severe breaches of confidentiality, integrity, and availability of critical systems and data.
Technical Details
The vulnerability exists within the Baseboard Management Controller (BMC) component of AMIās SPx Management Controller. Specifically, the flaw permits remote authentication bypass, meaning that unauthorized users can access management functions without going through the proper authentication processes. This vulnerability alters the expected security mechanisms designed to protect sensitive hardware management operations.
Potential Impact of CVE-2024-54085
-
Loss of Confidentiality: Successful exploitation could provide attackers access to sensitive information stored or processed by the management interface, leading to potential data leaks.
-
Integrity Compromise: Attackers could alter or manipulate system settings and configurations without authorization, risking the reliability and accuracy of managed systems.
-
Availability Threat: An attacker gaining access to the management controller could disrupt service availability, potentially leading to downtime or service outages that affect business operations.
Affected Version(s)
MegaRAC-SPx 12.0 < 12.7
MegaRAC-SPx 13.0 < 13.5
News Articles
ASUS releases fix for AMI bug that lets hackers brick servers
ASUS has released security updates to address CVE-2024-54085, a maximum severity flaw that could allow attackers to hijack and potentially brick servers.
3 weeks ago
Security vulnerability with maximum risk level in remote server maintenance
Ethernet ports for remote maintenance do not belong on the public network, as a current security vulnerability impressively demonstrates.
Critical AMI MegaRAC bug can let attackers hijack, brick servers
āA new critical severity vulnerability found in American Megatrends International's MegaRAC Baseboard Management Controller (BMC) software can let attackers hijack and potentially brick vulnerable servers.
References
CVSS V4
Timeline
- š°
Used in Ransomware
- š¾
Exploit known to exist
- š°
First article discovered by SecurityWeek
Vulnerability published
Vulnerability Reserved