Critical authentication bypass vulnerability in AMI MegaRAC BMC software affecting server management interfaces. Allows remote unauthenticated attackers to bypass authentication through the Redfish Host Interface with no user interaction required.
Data Source: CIRCL
Confidence: HIGH
Exploitation Method: DIRECT_NETWORK
CVE Published: 2025-03-11
Added to CISA KEV: 2025-06-25 106 DAYS BETWEEN CVE AND KEV
CVE-2024-54085 is a critical (CVSS score 10.0) authentication bypass vulnerability affecting AMI MegaRAC Baseboard Management Controller (BMC)
Search engines that scan internet-facing devices reveal at least 1000 exposed servers running vulnerable software versions. Researchers confirmed the flaw affects HPE Cray XD670, Asus RS720A-E11-RS24U, and ASRockRack servers. How can the flaw be exploited?
CVE-2024-54085 AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability ; CVE-2024-0769 D-Link DIR-859 Router Path Traversal Vulnerability ...
Tracked as CVE-2024-54085, the flaw allows attackers to take complete control of vulnerable servers with minimal effort and no user interaction. MegaRAC BMC software enables remote management of server hardware, including rebooting, troubleshooting, or system recovery—critical features for cloud service providers and enterprise data centers.
On Wednesday, CISA added CVE-2024-54085 to its list of vulnerabilities known to be exploited in the wild. The notice provided no further details.