AMI’s SPx contains
a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation
of this vulnerability may lead to a loss of confidentiality, integrity, and/or
availability.
References
Link | Resource |
---|---|
https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf | Vendor Advisory |
https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/ | Press/Media Coverage Third Party Advisory |
https://eclypsium.com/blog/bmc-vulnerability-cve-2024-05485-cisa-known-exploited-vulnerabilities/ | Press/Media Coverage Third Party Advisory |
https://security.netapp.com/advisory/ntap-20250328-0003/ | Third Party Advisory |
https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/ | Press/Media Coverage Third Party Advisory |
https://www.networkworld.com/article/4013368/ami-megarac-authentication-bypass-flaw-is-being-exploitated-cisa-warns.html | Press/Media Coverage Third Party Advisory |
https://nvd.nist.gov/vuln/detail/CVE-2024-54085 | US Government Resource |
https://security.netapp.com/advisory/ntap-20250328-0003/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
History
27 Jun 2025, 16:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/ - Press/Media Coverage, Third Party Advisory | |
References | () https://eclypsium.com/blog/bmc-vulnerability-cve-2024-05485-cisa-known-exploited-vulnerabilities/ - Press/Media Coverage, Third Party Advisory | |
References | () https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/ - Press/Media Coverage, Third Party Advisory | |
References | () https://www.networkworld.com/article/4013368/ami-megarac-authentication-bypass-flaw-is-being-exploitated-cisa-warns.html - Press/Media Coverage, Third Party Advisory |
27 Jun 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Jun 2025, 19:29
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf - Vendor Advisory | |
References | () https://security.netapp.com/advisory/ntap-20250328-0003/ - Third Party Advisory | |
References | () https://nvd.nist.gov/vuln/detail/CVE-2024-54085 - US Government Resource | |
First Time |
Netapp h300s
Netapp sg110 Firmware Netapp sg1100 Firmware Ami Ami megarac Sp-x Netapp h300s Firmware Netapp h410s Netapp sg6160 Firmware Netapp sg110 Netapp sg6160 Netapp h410c Firmware Netapp h410s Firmware Netapp sgf6112 Netapp h410c Netapp h500s Netapp h500s Firmware Netapp Netapp h700s Netapp sgf6112 Firmware Netapp sg1100 Netapp h700s Firmware |
|
CPE | cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:sg1100_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:sg6160:-:*:*:*:*:*:*:* cpe:2.3:o:ami:megarac_sp-x:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:sg110:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:sg1100:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:sgf6112:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:sg110_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:sg6160_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:sgf6112_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* |
26 Jun 2025, 01:00
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://security.netapp.com/advisory/ntap-20250328-0003/ - |
25 Jun 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://security.netapp.com/advisory/ntap-20250328-0003/ - |
28 Mar 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://security.netapp.com/advisory/ntap-20250328-0003/ - | |
Summary |
|
|
References |
|
11 Mar 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-11 14:15
Updated : 2025-06-27 16:57
NVD link : CVE-2024-54085
Mitre link : CVE-2024-54085
CVE.ORG link : CVE-2024-54085
JSON object : View
Products Affected
netapp
- h700s_firmware
- h300s_firmware
- h410s
- sg110_firmware
- sg110
- h700s
- sg1100
- sgf6112_firmware
- sg1100_firmware
- h300s
- sgf6112
- h410c
- h410c_firmware
- sg6160
- h500s
- h500s_firmware
- h410s_firmware
- sg6160_firmware
ami
- megarac_sp-x
CWE
CWE-290
Authentication Bypass by Spoofing