CVE-2024-54085

AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:ami:megarac_sp-x:*:*:*:*:*:*:*:*
cpe:2.3:o:ami:megarac_sp-x:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:sg6160_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg6160:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:netapp:sgf6112_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sgf6112:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:netapp:sg110_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg110:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:netapp:sg1100_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg1100:-:*:*:*:*:*:*:*

History

27 Jun 2025, 16:57

Type Values Removed Values Added
References () https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/ - () https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/ - Press/Media Coverage, Third Party Advisory
References () https://eclypsium.com/blog/bmc-vulnerability-cve-2024-05485-cisa-known-exploited-vulnerabilities/ - () https://eclypsium.com/blog/bmc-vulnerability-cve-2024-05485-cisa-known-exploited-vulnerabilities/ - Press/Media Coverage, Third Party Advisory
References () https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/ - () https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/ - Press/Media Coverage, Third Party Advisory
References () https://www.networkworld.com/article/4013368/ami-megarac-authentication-bypass-flaw-is-being-exploitated-cisa-warns.html - () https://www.networkworld.com/article/4013368/ami-megarac-authentication-bypass-flaw-is-being-exploitated-cisa-warns.html - Press/Media Coverage, Third Party Advisory

27 Jun 2025, 12:15

Type Values Removed Values Added
References
  • () https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/ -
  • () https://eclypsium.com/blog/bmc-vulnerability-cve-2024-05485-cisa-known-exploited-vulnerabilities/ -
  • () https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/ -
  • () https://www.networkworld.com/article/4013368/ami-megarac-authentication-bypass-flaw-is-being-exploitated-cisa-warns.html -

26 Jun 2025, 19:29

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf - () https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf - Vendor Advisory
References () https://security.netapp.com/advisory/ntap-20250328-0003/ - () https://security.netapp.com/advisory/ntap-20250328-0003/ - Third Party Advisory
References () https://nvd.nist.gov/vuln/detail/CVE-2024-54085 - () https://nvd.nist.gov/vuln/detail/CVE-2024-54085 - US Government Resource
First Time Netapp h300s
Netapp sg110 Firmware
Netapp sg1100 Firmware
Ami
Ami megarac Sp-x
Netapp h300s Firmware
Netapp h410s
Netapp sg6160 Firmware
Netapp sg110
Netapp sg6160
Netapp h410c Firmware
Netapp h410s Firmware
Netapp sgf6112
Netapp h410c
Netapp h500s
Netapp h500s Firmware
Netapp
Netapp h700s
Netapp sgf6112 Firmware
Netapp sg1100
Netapp h700s Firmware
CPE cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:sg1100_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg6160:-:*:*:*:*:*:*:*
cpe:2.3:o:ami:megarac_sp-x:*:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg110:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg1100:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sgf6112:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:sg110_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:sg6160_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:sgf6112_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*

26 Jun 2025, 01:00

Type Values Removed Values Added
References
  • () https://nvd.nist.gov/vuln/detail/CVE-2024-54085 -
References () https://security.netapp.com/advisory/ntap-20250328-0003/ - () https://security.netapp.com/advisory/ntap-20250328-0003/ -

25 Jun 2025, 20:15

Type Values Removed Values Added
References
  • () https://nvd.nist.gov/vuln/detail/CVE-2024-54085 -
References () https://security.netapp.com/advisory/ntap-20250328-0003/ - () https://security.netapp.com/advisory/ntap-20250328-0003/ -

28 Mar 2025, 15:15

Type Values Removed Values Added
References
  • {'url': 'https://nvd.nist.gov/vuln/detail/CVE-2024-54085', 'source': '134c704f-9b21-4f2e-91b3-4a467353bcc0'}
References () https://security.netapp.com/advisory/ntap-20250328-0003/ - () https://security.netapp.com/advisory/ntap-20250328-0003/ -
Summary
  • (es) El SPx de AMI contiene una vulnerabilidad en el BMC que permite a un atacante eludir la autenticación remotamente a través de la interfaz de host de Redfish. Una explotación exitosa de esta vulnerabilidad puede provocar la pérdida de confidencialidad, integridad o disponibilidad.
References
  • () https://security.netapp.com/advisory/ntap-20250328-0003/ -

11 Mar 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-11 14:15

Updated : 2025-06-27 16:57


NVD link : CVE-2024-54085

Mitre link : CVE-2024-54085

CVE.ORG link : CVE-2024-54085


JSON object : View

Products Affected

netapp

  • h700s_firmware
  • h300s_firmware
  • h410s
  • sg110_firmware
  • sg110
  • h700s
  • sg1100
  • sgf6112_firmware
  • sg1100_firmware
  • h300s
  • sgf6112
  • h410c
  • h410c_firmware
  • sg6160
  • h500s
  • h500s_firmware
  • h410s_firmware
  • sg6160_firmware

ami

  • megarac_sp-x
CWE
CWE-290

Authentication Bypass by Spoofing