CVE-2024-54085

AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:ami:megarac_sp-x:*:*:*:*:*:*:*:*
cpe:2.3:o:ami:megarac_sp-x:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:sg6160_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg6160:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:netapp:sgf6112_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sgf6112:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:netapp:sg110_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg110:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:netapp:sg1100_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg1100:-:*:*:*:*:*:*:*

History

27 Jun 2025, 16:57

Type Values Removed Values Added
References () https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/ - () https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/ - Press/Media Coverage, Third Party Advisory
References () https://eclypsium.com/blog/bmc-vulnerability-cve-2024-05485-cisa-known-exploited-vulnerabilities/ - () https://eclypsium.com/blog/bmc-vulnerability-cve-2024-05485-cisa-known-exploited-vulnerabilities/ - Press/Media Coverage, Third Party Advisory
References () https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/ - () https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/ - Press/Media Coverage, Third Party Advisory
References () https://www.networkworld.com/article/4013368/ami-megarac-authentication-bypass-flaw-is-being-exploitated-cisa-warns.html - () https://www.networkworld.com/article/4013368/ami-megarac-authentication-bypass-flaw-is-being-exploitated-cisa-warns.html - Press/Media Coverage, Third Party Advisory

27 Jun 2025, 12:15

Type Values Removed Values Added
References
  • () https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/ -
  • () https://eclypsium.com/blog/bmc-vulnerability-cve-2024-05485-cisa-known-exploited-vulnerabilities/ -
  • () https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/ -
  • () https://www.networkworld.com/article/4013368/ami-megarac-authentication-bypass-flaw-is-being-exploitated-cisa-warns.html -

26 Jun 2025, 19:29

Type Values Removed Values Added
References () https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf - () https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf - Vendor Advisory
References () https://security.netapp.com/advisory/ntap-20250328-0003/ - () https://security.netapp.com/advisory/ntap-20250328-0003/ - Third Party Advisory
References () https://nvd.nist.gov/vuln/detail/CVE-2024-54085 - () https://nvd.nist.gov/vuln/detail/CVE-2024-54085 - US Government Resource
First Time Netapp h500s Firmware
Netapp
Netapp sg110 Firmware
Netapp h410s Firmware
Netapp h700s Firmware
Netapp sg6160
Netapp h410c
Netapp h500s
Netapp sg1100 Firmware
Netapp sg1100
Netapp h300s
Netapp h300s Firmware
Netapp h410s
Netapp sgf6112
Netapp sg6160 Firmware
Netapp h410c Firmware
Netapp sg110
Netapp sgf6112 Firmware
Ami megarac Sp-x
Ami
Netapp h700s
CPE cpe:2.3:h:netapp:sgf6112:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:ami:megarac_sp-x:*:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg1100:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg110:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:sg110_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:sg1100_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:sg6160_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:sgf6112_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg6160:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

26 Jun 2025, 01:00

Type Values Removed Values Added
References
  • () https://nvd.nist.gov/vuln/detail/CVE-2024-54085 -
References () https://security.netapp.com/advisory/ntap-20250328-0003/ - () https://security.netapp.com/advisory/ntap-20250328-0003/ -

25 Jun 2025, 20:15

Type Values Removed Values Added
References
  • () https://nvd.nist.gov/vuln/detail/CVE-2024-54085 -
References () https://security.netapp.com/advisory/ntap-20250328-0003/ - () https://security.netapp.com/advisory/ntap-20250328-0003/ -

28 Mar 2025, 15:15

Type Values Removed Values Added
References
  • {'url': 'https://nvd.nist.gov/vuln/detail/CVE-2024-54085', 'source': '134c704f-9b21-4f2e-91b3-4a467353bcc0'}
References () https://security.netapp.com/advisory/ntap-20250328-0003/ - () https://security.netapp.com/advisory/ntap-20250328-0003/ -
References
  • () https://security.netapp.com/advisory/ntap-20250328-0003/ -
Summary
  • (es) El SPx de AMI contiene una vulnerabilidad en el BMC que permite a un atacante eludir la autenticación remotamente a través de la interfaz de host de Redfish. Una explotación exitosa de esta vulnerabilidad puede provocar la pérdida de confidencialidad, integridad o disponibilidad.

11 Mar 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-11 14:15

Updated : 2025-06-27 16:57


NVD link : CVE-2024-54085

Mitre link : CVE-2024-54085

CVE.ORG link : CVE-2024-54085


JSON object : View

Products Affected

netapp

  • h700s_firmware
  • h700s
  • h500s
  • h410s_firmware
  • sg6160_firmware
  • sg1100_firmware
  • h300s
  • h410c_firmware
  • h300s_firmware
  • h410s
  • sgf6112
  • h500s_firmware
  • sg1100
  • sgf6112_firmware
  • sg110_firmware
  • sg110
  • h410c
  • sg6160

ami

  • megarac_sp-x
CWE
CWE-290

Authentication Bypass by Spoofing