• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
critical flaws in ami megarac bmc software expose servers to

Critical Flaws in AMI MegaRAC BMC Software Expose Servers to Remote Attacks

You are here: Home / General Cyber Security News / Critical Flaws in AMI MegaRAC BMC Software Expose Servers to Remote Attacks
July 20, 2023

Two additional security flaws have been disclosed in AMI MegaRAC Baseboard Administration Controller (BMC) software that, if properly exploited, could permit menace actors to remotely commandeer vulnerable servers and deploy malware.

“These new vulnerabilities selection in severity from High to Critical, including unauthenticated remote code execution and unauthorized system accessibility with superuser permissions,” Eclypsium researchers Vlad Babkin and Scott Scheferman mentioned in a report shared with The Hacker News.

“They can be exploited by distant attackers obtaining obtain to Redfish remote management interfaces, or from a compromised host running system.”

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


To make issues worse, the shortcomings could also be weaponized to fall persistent firmware implants that are immune to working program reinstalls and challenging generate replacements, brick motherboard components, cause bodily problems via overvolting attacks, and induce indefinite reboot loops.

“As attackers change their emphasis from user going through functioning systems to the decrease level embedded code which hardware and computing have confidence in relies on, compromise gets more challenging to detect and exponentially much more sophisticated to remediate,” the researchers pointed out.

The vulnerabilities are the newest additions to a established of bugs impacting AMI MegaRAC BMCs that have been cumulatively named BMC&C, some of which have been disclosed by the firmware security business in December 2022 (CVE-2022-40259, CVE-2022-40242, and CVE-2022-2827) and February 2023 (CVE-2022-26872 and CVE-2022-40258).

The record of new flaws is as follows –

  • CVE-2023-34329 (CVSS score: 9.9) – Authentication bypass by way of HTTP header spoofing
  • CVE-2023-34330 (CVSS rating: 6.7) – Code injection by way of dynamic Redfish extension interface

When chained together, the two bugs carry a blended severity rating of 10., permitting an adversary to sidestep Redfish authentication and remotely execute arbitrary code on the BMC chip with the highest privileges. In addition, the aforementioned flaws could be blended with CVE-2022-40258 to crack passwords for the admin accounts on the BMC chip.

Approaching WEBINARShield Against Insider Threats: Grasp SaaS Security Posture Administration

Anxious about insider threats? We have obtained you protected! Be part of this webinar to take a look at practical techniques and the insider secrets of proactive security with SaaS Security Posture Administration.

Be part of These days

It’s worth pointing out that an attack of this nature could final result in the installation of malware that could be used for conducting very long-phrase cyber espionage although flying beneath the radar of security software program, not to point out executing lateral movement and even damage the CPU by energy management tampering approaches like PMFault.

“These vulnerabilities pose a key risk to the technology offer chain that underlies cloud computing,” the scientists mentioned. “In small, vulnerabilities in a element supplier influence quite a few components vendors, which in convert can be handed on to quite a few cloud companies.”

“As such these vulnerabilities can pose a risk to servers and components that an firm owns specifically as nicely as the components that supports the cloud providers that they use.”

Found this report intriguing? Adhere to us on Twitter  and LinkedIn to read through additional exceptional material we post.


Some components of this report are sourced from:
thehackernews.com

Previous Post: «apache openmeetings web conferencing tool exposed to critical vulnerabilities Apache OpenMeetings Web Conferencing Tool Exposed to Critical Vulnerabilities
Next Post: Citrix NetScaler ADC and Gateway Devices Under Attack: CISA Urges Immediate Action citrix netscaler adc and gateway devices under attack: cisa urges»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.