Home

Description

AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.

PUBLISHED Reserved 2024-11-28 | Published 2025-03-11 | Updated 2025-10-21 | Assigner AMI




CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

CISA Known Exploited Vulnerability

Date added 2025-06-25 | Due date 2025-07-16

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Problem types

CWE-290 Authentication Bypass by Spoofing

Product status

Default status
unaffected

12.0 (RC) before 12.7
affected

13.0 (RC) before 13.5
affected

References

security.netapp.com/advisory/ntap-20250328-0003/ third-party-advisory

nvd.nist.gov/vuln/detail/CVE-2024-54085 government-resource

www.cisa.gov/...erabilities-catalog?field_cve=CVE-2024-54085 government-resource

security.netapp.com/advisory/ntap-20250328-0003/

arstechnica.com/...ement-tool-imperils-thousands-of-servers/

www.bleepingcomputer.com/...-servers-now-actively-exploited/

eclypsium.com/...05485-cisa-known-exploited-vulnerabilities/

www.networkworld.com/...is-being-exploitated-cisa-warns.html

go.ami.com/hubfs/Security Advisories/2025/AMI-SA-2025003.pdf

cve.org (CVE-2024-54085)

nvd.nist.gov (CVE-2024-54085)

Download JSON