- American Megadends International has published a fix for Megarac Greatboard Management Controller (BMC)
- Different OEMs now implement the corrective in their products
- Asus has published a fix to approach the bug
Asus corrected a security flaw that could have tinkered with servers.
The defect is followed as CVE-2024-54085 and has the lack of maximum severity-10/10. As the company explained, it affects the MEGATENDS INTERNATIONAL Folding Controller (AMI) American Megatends (AMI), a firmware solution that allows the management of remote or “bright” remote servers.
With BMC, administrators can monitor, troubleshoot and control servers even when they are deactivated.
Remote
“AMI’s SPX contains vulnerability in the BMC where an attacker can bypass remote authentication via the Sébaste host interface,” he said on the CVE NVD page. “A successful exploitation of this vulnerability can lead to a loss of confidentiality, integrity and / or availability.”
BMC is used by “more than a dozen” of server equipment suppliers, including HPE, Asus and Asrock.
Eclypse researchers, who have written an in -depth report on the bug, said that he could be abused malware and even ransomware attacks:
“The exploitation of this vulnerability allows an attacker to control the compromise server remotely, to distant malware, ransomware, firmware falsification, components of the brick card components (BMC or potentially bios / uefi), a potential damage (overlavage / bricks) and an indefinite reboot of victim.”
Friend published a patch in mid-March, it was said, but it took OEM to implement it. HPE, for example, published a security bulletin on March 20, approaching the vulnerability of the HPE Cray XD670 server. This bulletin also confirmed that vulnerability could be exploited remotely to allow the bypass of authentication. In addition, reports indicate that HPE has published security updates for their products that integrate the friend’s fix for CVE-2024-54085.
Asus has now tackled the bug on four motherboards.
Users are advised to upgrade their BMC firmware in these versions:
PRO WS W790E -SAGE SE – Version 1.1.57
PRO WS W680M -ACE SE – Version 1.1.21
Pro WS WRX90E -SAGE SE – version 2.1.28
PRO WS WRX80E -SAGE WIFI – version 1.34.0
Since it is a maximum severity defect which allows infections of ransomware, users are advised to apply the update without delay.
Via Bleeping Compompute