CVE-2024-54085
CRITICAL
10,0
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
CRITICAL
9,8
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high
Description
AI Translation Available
AMI’s SPx contains
a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation
of this vulnerability may lead to a loss of confidentiality, integrity, and/or
availability.
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,1047
Percentile
0,9th
Updated
EPSS Score Trend (Last 90 Days)
290
Authentication Bypass by Spoofing
IncompleteCommon Consequences
Security Scopes Affected:
Access Control
Potential Impacts:
Bypass Protection Mechanism
Gain Privileges Or Assume Identity
Applicable Platforms
All platforms may be affected
Operating System
Sgf6112 Firmware by Netapp
CPE Identifier
View Detailed Analysis
cpe:2.3:o:netapp:sgf6112_firmware:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Sg110 Firmware by Netapp
CPE Identifier
View Detailed Analysis
cpe:2.3:o:netapp:sg110_firmware:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
H410C Firmware by Netapp
CPE Identifier
View Detailed Analysis
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Megarac Sp-X by Ami
Version Range Affected
From
12
(inclusive)
To
12.7
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:ami:megarac_sp-x:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Sg6160 Firmware by Netapp
CPE Identifier
View Detailed Analysis
cpe:2.3:o:netapp:sg6160_firmware:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
H700S Firmware by Netapp
CPE Identifier
View Detailed Analysis
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
H300S Firmware by Netapp
CPE Identifier
View Detailed Analysis
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
H500S Firmware by Netapp
CPE Identifier
View Detailed Analysis
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Sg1100 Firmware by Netapp
CPE Identifier
View Detailed Analysis
cpe:2.3:o:netapp:sg1100_firmware:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Megarac Sp-X by Ami
Version Range Affected
From
13
(inclusive)
To
13.5
(exclusive)
CPE Identifier
View Detailed Analysis
cpe:2.3:o:ami:megarac_sp-x:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
H410S Firmware by Netapp
CPE Identifier
View Detailed Analysis
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://nvd.nist.gov/vuln/detail/CVE-2024-54085
https://security.netapp.com/advisory/ntap-20250328-0003/
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024…
https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-…
https://eclypsium.com/blog/bmc-vulnerability-cve-2024-05485-cisa-known-exploite…
https://security.netapp.com/advisory/ntap-20250328-0003/
https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-h…
https://www.networkworld.com/article/4013368/ami-megarac-authentication-bypass-…
https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf