Known Exploited Vulnerabilities CVE-2024-54085

AMI MegaRAC SPx contains an authentication bypass by spoofing vulnerability in the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
CVE-2024-54085 AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability exploitation_technique T1068 Exploitation for Privilege Escalation
Comments
By sending a malicious request to the Redfish Host Interface, an attacker can manipulate the HTTP header, tricking the Baseboard Management Controller (BMC) into thinking that the request originates from a trusted source, leading to authentication bypass. This can lead to complete system control, deployment of malware at the firmware level, and network disruptions.
References
CVE-2024-54085 AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability primary_impact T1495 Firmware Corruption
Comments
By sending a malicious request to the Redfish Host Interface, an attacker can manipulate the HTTP header, tricking the Baseboard Management Controller (BMC) into thinking that the request originates from a trusted source, leading to authentication bypass. This can lead to complete system control, deployment of malware at the firmware level, and network disruptions.
References
CVE-2024-54085 AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability primary_impact T1608.001 Upload Malware
Comments
By sending a malicious request to the Redfish Host Interface, an attacker can manipulate the HTTP header, tricking the Baseboard Management Controller (BMC) into thinking that the request originates from a trusted source, leading to authentication bypass. This can lead to complete system control, deployment of malware at the firmware level, and network disruptions.
References
CVE-2024-54085 AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability primary_impact T1210 Exploitation of Remote Services
Comments
By sending a malicious request to the Redfish Host Interface, an attacker can manipulate the HTTP header, tricking the Baseboard Management Controller (BMC) into thinking that the request originates from a trusted source, leading to authentication bypass. This can lead to complete system control, deployment of malware at the firmware level, and network disruptions.
References
CVE-2024-54085 AMI MegaRAC SPx Authentication Bypass by Spoofing Vulnerability primary_impact T1499 Endpoint Denial of Service
Comments
By sending a malicious request to the Redfish Host Interface, an attacker can manipulate the HTTP header, tricking the Baseboard Management Controller (BMC) into thinking that the request originates from a trusted source, leading to authentication bypass. This can lead to complete system control, deployment of malware at the firmware level, and network disruptions.
References