Authentication Bypass via Redfish Host Interface in AMI SPx BMC
CVE-2024-54085 Published on March 11, 2025

Redfish Authentication Bypass
AMIs SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.

NVD

Known Exploited Vulnerability

This AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. AMI MegaRAC SPx contains an authentication bypass by spoofing vulnerability in the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.

The following remediation steps are recommended / required by July 16, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weakness Type

Authentication Bypass by Spoofing

This attack-focused weakness is caused by improperly implemented authentication schemes that are subject to spoofing attacks.


Products Associated with CVE-2024-54085

Want to know whenever a new CVE is published for Ami Megarac Sp X? stack.watch will email you.

 

Affected Versions

AMI MegaRAC-SPx:

Exploit Probability

EPSS
42.97%
Percentile
97.50%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.