- American Megatrends International released a fix for MegaRAC Baseboard Management Controller (BMC)
- Different OEMs are now implementing the fix in their products
- ASUS released a patch to address the bug
Asus has patched a security flaw which could have bricked servers.
The flaw is tracked as CVE-2024-54085, and has the maximum severity flaw – 10/10. As the company explained, it affects American Megatrends International’s (AMI) MegaRAC Baseboard Management Controller (BMC), a firmware solution that enables out-of-band, or “lights-out” remote server management.
With BMC, admins can monitor, troubleshoot, and control servers even when they’re turned off.
Keeper is a cybersecurity platform primarily known for its password manager and digital vault, designed to help individuals, families, and businesses securely store and manage passwords, sensitive files, and other private data.
It uses zero-knowledge encryption and offers features like two-factor authentication, dark web monitoring, secure file storage, and breach alerts to protect against cyber threats.
Preferred partner (What does this mean?)View Deal
Remote control
“AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface,” it says on the CVE’s NVD page. “A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.”
BMC is used by “over a dozen” server hardware vendors, including HPE, Asus, and ASRock.
Security researchers from Eclypsium, who wrote an in-depth report about the bug, said it could be abused in malware infections and even ransomware attacks:
“Exploitation of this vulnerability allows an attacker to remotely control the compromised server, remotely deploy malware, ransomware, firmware tampering, bricking motherboard components (BMC or potentially BIOS/UEFI), potential server physical damage (over-voltage / bricking), and indefinite reboot loops that a victim cannot stop.”
AMI released a patch in mid-March, it was said, but it took OEMs time to implement it. HPE, for example, published a security bulletin on March 20, addressing the vulnerability for HPE Cray XD670 server. This bulletin also confirmed that the vulnerability could be remotely exploited to allow authentication bypass. Additionally, reports indicate that HPE has released security updates for their products that integrate AMI’s fix for CVE-2024-54085.
ASUS has now addressed the bug on four motherboards.
Users are advised to upgrade their BMC firmware to these versions:
PRO WS W790E-SAGE SE – version 1.1.57
PRO WS W680M-ACE SE – version 1.1.21
PRO WS WRX90E-SAGE SE – version 2.1.28
Pro WS WRX80E-SAGE SE WIFI – version 1.34.0
Since this is a maximum-severity flaw that allows ransomware infections, users are advised to apply the update without delay.
Via BleepingComputer
You might also like
- This large-scale hack could affect millions of servers across the world
- Take a look at our guide to the best authenticator app
- We’ve rounded up the best password managers
This articles is written by : Nermeen Nabil Khear Abdelmalak
All rights reserved to : USAGOLDMIES . www.usagoldmines.com
You can Enjoy surfing our website categories and read more content in many fields you may like .
Why USAGoldMines ?
USAGoldMines is a comprehensive website offering the latest in financial, crypto, and technical news. With specialized sections for each category, it provides readers with up-to-date market insights, investment trends, and technological advancements, making it a valuable resource for investors and enthusiasts in the fast-paced financial world.