• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
critical flaws in ami megarac bmc software expose servers to

Critical Flaws in AMI MegaRAC BMC Software Expose Servers to Remote Attacks

You are here: Home / General Cyber Security News / Critical Flaws in AMI MegaRAC BMC Software Expose Servers to Remote Attacks
July 20, 2023

Two additional security flaws have been disclosed in AMI MegaRAC Baseboard Administration Controller (BMC) software that, if properly exploited, could permit menace actors to remotely commandeer vulnerable servers and deploy malware.

“These new vulnerabilities selection in severity from High to Critical, including unauthenticated remote code execution and unauthorized system accessibility with superuser permissions,” Eclypsium researchers Vlad Babkin and Scott Scheferman mentioned in a report shared with The Hacker News.

“They can be exploited by distant attackers obtaining obtain to Redfish remote management interfaces, or from a compromised host running system.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


To make issues worse, the shortcomings could also be weaponized to fall persistent firmware implants that are immune to working program reinstalls and challenging generate replacements, brick motherboard components, cause bodily problems via overvolting attacks, and induce indefinite reboot loops.

“As attackers change their emphasis from user going through functioning systems to the decrease level embedded code which hardware and computing have confidence in relies on, compromise gets more challenging to detect and exponentially much more sophisticated to remediate,” the researchers pointed out.

The vulnerabilities are the newest additions to a established of bugs impacting AMI MegaRAC BMCs that have been cumulatively named BMC&C, some of which have been disclosed by the firmware security business in December 2022 (CVE-2022-40259, CVE-2022-40242, and CVE-2022-2827) and February 2023 (CVE-2022-26872 and CVE-2022-40258).

The record of new flaws is as follows –

  • CVE-2023-34329 (CVSS score: 9.9) – Authentication bypass by way of HTTP header spoofing
  • CVE-2023-34330 (CVSS rating: 6.7) – Code injection by way of dynamic Redfish extension interface

When chained together, the two bugs carry a blended severity rating of 10., permitting an adversary to sidestep Redfish authentication and remotely execute arbitrary code on the BMC chip with the highest privileges. In addition, the aforementioned flaws could be blended with CVE-2022-40258 to crack passwords for the admin accounts on the BMC chip.

Approaching WEBINARShield Against Insider Threats: Grasp SaaS Security Posture Administration

Anxious about insider threats? We have obtained you protected! Be part of this webinar to take a look at practical techniques and the insider secrets of proactive security with SaaS Security Posture Administration.

Be part of These days

It’s worth pointing out that an attack of this nature could final result in the installation of malware that could be used for conducting very long-phrase cyber espionage although flying beneath the radar of security software program, not to point out executing lateral movement and even damage the CPU by energy management tampering approaches like PMFault.

“These vulnerabilities pose a key risk to the technology offer chain that underlies cloud computing,” the scientists mentioned. “In small, vulnerabilities in a element supplier influence quite a few components vendors, which in convert can be handed on to quite a few cloud companies.”

“As such these vulnerabilities can pose a risk to servers and components that an firm owns specifically as nicely as the components that supports the cloud providers that they use.”

Found this report intriguing? Adhere to us on Twitter  and LinkedIn to read through additional exceptional material we post.


Some components of this report are sourced from:
thehackernews.com

Previous Post: «apache openmeetings web conferencing tool exposed to critical vulnerabilities Apache OpenMeetings Web Conferencing Tool Exposed to Critical Vulnerabilities
Next Post: Citrix NetScaler ADC and Gateway Devices Under Attack: CISA Urges Immediate Action citrix netscaler adc and gateway devices under attack: cisa urges»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • NightEagle APT Exploits Microsoft Exchange Flaw to Target China’s Military and Tech Sectors
  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Critical Sudo Vulnerabilities Let Local Users Gain Root Access on Linux, Impacting Major Distros
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • Massive Android Fraud Operations Uncovered: IconAds, Kaleidoscope, SMS Malware, NFC Scams
  • Over 40 Malicious Firefox Extensions Target Cryptocurrency Wallets, Stealing User Assets
  • The Hidden Weaknesses in AI SOC Tools that No One Talks About
  • Chinese Hackers Exploit Ivanti CSA Zero-Days in Attacks on French Government, Telecoms
  • Critical Cisco Vulnerability in Unified CM Grants Root Access via Static Credentials
  • North Korean Hackers Target Web3 with Nim Malware and Use ClickFix in BabyShark Campaign

Copyright © TheCyberSecurity.News, All Rights Reserved.