Saturday, 11 Apr 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > AMI MegaRAC authentication bypass flaw is being exploitated, CISA warns
Global Market

AMI MegaRAC authentication bypass flaw is being exploitated, CISA warns

Last updated: June 28, 2025 5:14 pm
Published June 28, 2025
Share
datacenter
SHARE

Contents
Gradual vendor response creates threat windowEnterprise operations in danger

The spoofing assault works by manipulating HTTP request headers despatched to the Redfish interface. Attackers can add particular values to headers like “X-Server-Addr” to make their exterior requests seem as in the event that they’re coming from contained in the server itself. For the reason that system robotically trusts inside requests as authenticated, this spoofing approach grants attackers administrator privileges while not having legitimate credentials.

Gradual vendor response creates threat window

The vulnerability exemplifies complicated enterprise safety challenges posed by firmware provide chains. AMI sits on the prime of the server provide chain, however every vendor should combine patches into their very own merchandise earlier than clients can deploy them.

Lenovo took till April 17 to launch its patch, whereas Asus patches for 4 motherboard fashions solely appeared in current weeks. Hewlett Packard Enterprise was among the many quicker responders, releasing updates in March for its Cray XD670 methods utilized in AI and high-performance computing workloads.

The patching delays are notably regarding given the vulnerability’s scope. Producers identified to make use of AMI’s MegaRAC SPx BMC embrace AMD, Ampere Computing, ASRock, ARM, Fujitsu, Gigabyte, Huawei, Nvidia, Supermicro, and Qualcomm, representing a good portion of enterprise server infrastructure. NetApp also confirmed in its safety advisory NTAP-20250328-0003 that a number of NetApp merchandise incorporating MegaRAC BMC firmware are additionally affected, increasing the affect to storage infrastructure.

Dell had earlier confirmed its methods are unaffected because it makes use of its personal iDRAC administration know-how as an alternative of AMI’s MegaRAC.

See also  Zscaler - CISA Zero Trust Maturity Model Whitepaper

Enterprise operations in danger

This widespread vendor affect interprets into severe operational dangers for enterprises. BMCs function at a privileged stage under the primary working system, making assaults notably harmful.

Source link

TAGGED: AMI, Authentication, Bypass, CISA, exploitated, flaw, MegaRAC, warns
Share This Article
Twitter Email Copy Link Print
Previous Article Extra Duty Solutions Raises Equity Funding Extra Duty Solutions Raises Equity Funding
Next Article Modified perovskite solar cells harvest energy from indoor fluorescent lighting Modified perovskite solar cells harvest energy from indoor fluorescent lighting
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Is the EU AI Act a step in the right direction?

The EU Artificial Intelligence Act is a set of laws designed to classify and govern…

August 4, 2025

Sedna Communications, a London, UK-based received $10M in Growth investment from CIBC Innovation Basking.

Sedna Communications, a London, UK-based AI-driven platform for maritime and provide chain companies, acquired $10M…

April 5, 2025

From Blank Box to Blockbuster Design

Architects and builders are devoting extra consideration to the exterior look of information facilities because…

February 13, 2025

Arvato expands hyperscaler services into Dubai’s digital hub

Arvato, a frontrunner in provide chain and e-commerce companies, has not too long ago bolstered…

September 3, 2025

Inside the EU’s military innovation push

With €7.3bn allotted for defence analysis and functionality improvement via 2027, the European Defence Fund…

March 4, 2026

You Might Also Like

Why sovereignty now shapes data centre planning in Europe
Global Market

Why sovereignty now shapes data centre planning in Europe

By saad
Heat emission from the chimneys of a large data and server complex.
Global Market

OpenAI puts part of Stargate project on hold over runaway power costs

By saad
EMEA data centre vacancy hits record low as AI demand outpaces supply
Global Market

EMEA data centre vacancy hits record low as AI demand outpaces supply

By saad
Germany only - Google erweitert Gemini-Portfolio mit kosteneffizienten Modellen
Global Market

Google owns the most AI compute, and it built it its way

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.