CVE-2024-54085

AMI’s SPx contains a vulnerability in the BMC where an Attacker may bypass authentication remotely through the Redfish Host Interface. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:ami:megarac_sp-x:*:*:*:*:*:*:*:*
cpe:2.3:o:ami:megarac_sp-x:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:netapp:sg6160_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg6160:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:netapp:sgf6112_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sgf6112:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:netapp:sg110_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg110:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:netapp:sg1100_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg1100:-:*:*:*:*:*:*:*

History

27 Jun 2025, 16:57

Type Values Removed Values Added
References () https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/ - () https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/ - Press/Media Coverage, Third Party Advisory
References () https://www.networkworld.com/article/4013368/ami-megarac-authentication-bypass-flaw-is-being-exploitated-cisa-warns.html - () https://www.networkworld.com/article/4013368/ami-megarac-authentication-bypass-flaw-is-being-exploitated-cisa-warns.html - Press/Media Coverage, Third Party Advisory
References () https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/ - () https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/ - Press/Media Coverage, Third Party Advisory
References () https://eclypsium.com/blog/bmc-vulnerability-cve-2024-05485-cisa-known-exploited-vulnerabilities/ - () https://eclypsium.com/blog/bmc-vulnerability-cve-2024-05485-cisa-known-exploited-vulnerabilities/ - Press/Media Coverage, Third Party Advisory

27 Jun 2025, 12:15

Type Values Removed Values Added
References
  • () https://www.networkworld.com/article/4013368/ami-megarac-authentication-bypass-flaw-is-being-exploitated-cisa-warns.html -
  • () https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/ -
  • () https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/ -
  • () https://eclypsium.com/blog/bmc-vulnerability-cve-2024-05485-cisa-known-exploited-vulnerabilities/ -

26 Jun 2025, 19:29

Type Values Removed Values Added
CPE cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:ami:megarac_sp-x:*:*:*:*:*:*:*:*
cpe:2.3:o:netapp:sg6160_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:sg110_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:sg1100_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg1100:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg110:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sg6160:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:sgf6112_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:sgf6112:-:*:*:*:*:*:*:*
cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Netapp h300s
Netapp h410c
Netapp h500s
Netapp h500s Firmware
Netapp h700s
Netapp h410s Firmware
Netapp sg6160 Firmware
Netapp h700s Firmware
Netapp sg110
Netapp h410c Firmware
Netapp h300s Firmware
Ami megarac Sp-x
Netapp sgf6112
Netapp sg1100 Firmware
Ami
Netapp sg6160
Netapp
Netapp h410s
Netapp sg110 Firmware
Netapp sg1100
Netapp sgf6112 Firmware
References () https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf - () https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf - Vendor Advisory
References () https://nvd.nist.gov/vuln/detail/CVE-2024-54085 - () https://nvd.nist.gov/vuln/detail/CVE-2024-54085 - US Government Resource
References () https://security.netapp.com/advisory/ntap-20250328-0003/ - () https://security.netapp.com/advisory/ntap-20250328-0003/ - Third Party Advisory

25 Jun 2025, 20:15

Type Values Removed Values Added
References
  • () https://nvd.nist.gov/vuln/detail/CVE-2024-54085 -

28 Mar 2025, 15:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20250328-0003/ -

11 Mar 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-11 14:15

Updated : 2025-06-27 16:57


NVD link : CVE-2024-54085

Mitre link : CVE-2024-54085


JSON object : View

Products Affected

netapp

  • sgf6112
  • h300s
  • h410s_firmware
  • sg1100_firmware
  • h410s
  • h500s
  • sg110
  • sgf6112_firmware
  • h700s
  • sg110_firmware
  • sg1100
  • h300s_firmware
  • h410c_firmware
  • sg6160
  • h410c
  • sg6160_firmware
  • h700s_firmware
  • h500s_firmware

ami

  • megarac_sp-x
CWE

No CWE.