Site icon Windows Mode

Race Against Time: Vendors Drag Feet on Critical AMI MegaRAC Firmware Fix

Portrait of Worried Professional Programmer Fixing a Bug, Dealing with Crashing System. Young Black Man Looking at Big Digital Screens Glitching While Displaying Code Lines, Thinking of Solutions

Key Points

Servers at Risk: Slow Patches for Critical MegaRAC Flaw

A critical vulnerability in the MegaRAC baseband management controller (BMC) firmware, used in many enterprise servers and storage systems, is still not fully patched weeks after the initial fix was released. AMI, the BIOS developer, addressed the issue (CVE-2024-54085) on March 11, but the slow rollout of OEM patches is leaving servers vulnerable to exploitation.

What’s at Risk?
The BMC, an embedded chip, enables remote server management via the Redfish interface, even when servers are off or unresponsive. A successful exploit could allow attackers to bypass authentication, control servers remotely, deploy malware or ransomware, and cause destructive actions like reboot loops or bricked motherboards. This vulnerability has the highest severity score of 10, making it a significant threat.

Who’s Affected?
Numerous OEMs use AMI’s MegaRAC BMC, including:

Exploitation Concerns
Eclypsium, the company that discovered the vulnerability, warned that the flaw affects the entire BIOS supply chain, impacting over a dozen manufacturers. Although no exploitation has been detected yet, the slow patch rollout increases the risk of attacks. This vulnerability is just the latest in a series of MegaRAC flaws discovered by Eclypsium since 2022, highlighting concerns about the software’s security.

Mitigation and Concerns
The slow response to CVE-2024-54085 highlights two main issues:

  1. Supply Chain Complexity: Patching software involving multiple vendors is challenging, and not all servers from a single vendor use the same BMC.
  2. Recurring Vulnerabilities: Eclypsium has uncovered numerous MegaRAC flaws in recent years, including the latest one found while examining a previous fix.

To mitigate risks, organizations should:

As the tech industry continues to address this critical vulnerability, the focus remains on the need for swift and coordinated patching efforts to protect against potential attacks. Microsoft’s Azure and Windows Server customers relying on affected OEM hardware should monitor their vendors’ updates and apply patches promptly to safeguard their infrastructure. The situation underscores the importance of robust supply chain security and timely vulnerability management in the tech sector.

Read the rest: Source Link

Don’t forget to check our list of Cheap Windows VPS Hosting providers, How to get Windows Server 2022, Try Windows 11 Pro for Workstations & browse Windows Azure content.

Remember to like our facebook and follow us on twitter @WindowsMode.

Exit mobile version