CVE-2024-54085
high-risk
Published 2025-03-11
AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
Do I need to act?
~
8.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (10)
References (9)
Press/Media Coverage
https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-t...
Press/Media Coverage
https://eclypsium.com/blog/bmc-vulnerability-cve-2024-05485-cisa-known-exploited...
Third Party Advisory
https://security.netapp.com/advisory/ntap-20250328-0003/
Press/Media Coverage
https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-ha...
Press/Media Coverage
https://www.networkworld.com/article/4013368/ami-megarac-authentication-bypass-f...
US Government Resource
https://nvd.nist.gov/vuln/detail/CVE-2024-54085
Third Party Advisory
https://security.netapp.com/advisory/ntap-20250328-0003/
US Government Resource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-...
65
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
17/34 · Moderate
Exposure
16/34 · Moderate