AMI’s SPx contains
a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation
of this vulnerability may lead to a loss of confidentiality, integrity, and/or
availability.
References
Link | Resource |
---|---|
https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf | Vendor Advisory |
https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/ | Press/Media Coverage Third Party Advisory |
https://eclypsium.com/blog/bmc-vulnerability-cve-2024-05485-cisa-known-exploited-vulnerabilities/ | Press/Media Coverage Third Party Advisory |
https://security.netapp.com/advisory/ntap-20250328-0003/ | Third Party Advisory |
https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/ | Press/Media Coverage Third Party Advisory |
https://www.networkworld.com/article/4013368/ami-megarac-authentication-bypass-flaw-is-being-exploitated-cisa-warns.html | Press/Media Coverage Third Party Advisory |
https://nvd.nist.gov/vuln/detail/CVE-2024-54085 | US Government Resource |
https://security.netapp.com/advisory/ntap-20250328-0003/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
History
27 Jun 2025, 16:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/ - Press/Media Coverage, Third Party Advisory | |
References | () https://eclypsium.com/blog/bmc-vulnerability-cve-2024-05485-cisa-known-exploited-vulnerabilities/ - Press/Media Coverage, Third Party Advisory | |
References | () https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/ - Press/Media Coverage, Third Party Advisory | |
References | () https://www.networkworld.com/article/4013368/ami-megarac-authentication-bypass-flaw-is-being-exploitated-cisa-warns.html - Press/Media Coverage, Third Party Advisory |
27 Jun 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
26 Jun 2025, 19:29
Type | Values Removed | Values Added |
---|---|---|
First Time |
Netapp h300s
Netapp sg6160 Firmware Netapp h410c Netapp sgf6112 Netapp sg110 Netapp h300s Firmware Netapp h700s Firmware Netapp sg6160 Netapp h410s Netapp h700s Netapp h410s Firmware Netapp sg110 Firmware Netapp Netapp sg1100 Firmware Netapp h500s Netapp sgf6112 Firmware Netapp h500s Firmware Ami megarac Sp-x Netapp h410c Firmware Netapp sg1100 Ami |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | () https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf - Vendor Advisory | |
References | () https://security.netapp.com/advisory/ntap-20250328-0003/ - Third Party Advisory | |
References | () https://nvd.nist.gov/vuln/detail/CVE-2024-54085 - US Government Resource | |
CPE | cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:sg110_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:sg1100_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:sg6160_firmware:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:sgf6112_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:sg6160:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:sgf6112:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:* cpe:2.3:o:ami:megarac_sp-x:*:*:*:*:*:*:*:* cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:sg110:-:*:*:*:*:*:*:* cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:sg1100:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:* cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:* |
26 Jun 2025, 01:00
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://security.netapp.com/advisory/ntap-20250328-0003/ - |
25 Jun 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://security.netapp.com/advisory/ntap-20250328-0003/ - |
28 Mar 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
|
References | () https://security.netapp.com/advisory/ntap-20250328-0003/ - | |
References |
|
11 Mar 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-11 14:15
Updated : 2025-06-27 16:57
NVD link : CVE-2024-54085
Mitre link : CVE-2024-54085
CVE.ORG link : CVE-2024-54085
JSON object : View
Products Affected
netapp
- h700s
- sg1100
- h410s
- sg110_firmware
- sg1100_firmware
- sgf6112_firmware
- sgf6112
- h300s_firmware
- sg6160_firmware
- h410s_firmware
- h300s
- sg6160
- h500s_firmware
- h700s_firmware
- sg110
- h410c
- h500s
- h410c_firmware
ami
- megarac_sp-x
CWE
CWE-290
Authentication Bypass by Spoofing