CVE-2024-54085
Redfish Authentication Bypass
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
| CWE | CWE-290 |
| Vendor | ami |
| Product | megarac-spx |
| Published | Mar 11, 2025 |
| Last Updated | Feb 26, 2026 |
⚠️ Actively Exploited — Act Now
Get instant alerts for ami megarac-spx
This vulnerability is actively exploited in the wild. Set up free real-time alerts so you're first to know about threats like CVE-2024-54085.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
AMI / MegaRAC-SPx
12.0 < 12.7 13.0 < 13.5
References
go.ami.com: https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf security.netapp.com: https://security.netapp.com/advisory/ntap-20250328-0003/ nvd.nist.gov: https://nvd.nist.gov/vuln/detail/CVE-2024-54085 cisa.gov: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-54085 arstechnica.com: https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/ bleepingcomputer.com: https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/ eclypsium.com: https://eclypsium.com/blog/bmc-vulnerability-cve-2024-05485-cisa-known-exploited-vulnerabilities/ networkworld.com: https://www.networkworld.com/article/4013368/ami-megarac-authentication-bypass-flaw-is-being-exploitated-cisa-warns.html