Authentication Bypass via Redfish Host Interface in AMI SPx BMC
CVE-2024-54085 Published on March 11, 2025
Redfish Authentication Bypass
AMIs SPx contains
a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation
of this vulnerability may lead to a loss of confidentiality, integrity, and/or
availability.
Known Exploited Vulnerability
This AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. AMI MegaRAC SPx contains an authentication bypass by spoofing vulnerability in the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
The following remediation steps are recommended / required by July 16, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Weakness Type
Authentication Bypass by Spoofing
This attack-focused weakness is caused by improperly implemented authentication schemes that are subject to spoofing attacks.
Products Associated with CVE-2024-54085
Want to know whenever a new CVE is published for Ami Megarac Sp X? stack.watch will email you.
Affected Versions
AMI MegaRAC-SPx:- Version 12.0 and below 12.7 is affected.
- Version 13.0 and below 13.5 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.