Skip to content
Home » Technology » Critical Server Flaw Exploited: Full Fleet Control at Risk

Critical Server Flaw Exploited: Full Fleet Control at Risk

by Rachel Kim

Critical BMC Vulnerability Exploited: Servers at risk of Firmware Implants

A newly discovered Baseboard Management Controller (BMC) vulnerability is sending shockwaves through the cybersecurity community. The Cybersecurity and Infrastructure Security Agency (CISA) added CVE-2024-54085 to its list of vulnerabilities known to be exploited in the wild on Wednesday, June 25, 2025, signaling an active threat to server infrastructure worldwide.

Scope of the BMC Exploit

Researchers at Eclypsium warned in an email on Thursday that the potential impact of these exploits is extensive. The vulnerability allows attackers to potentially gain deep control over affected servers. This control bypasses many traditional security measures.

Did You Know? A Baseboard Management Controller (BMC) is a specialized microcontroller embedded on the motherboard of a computer, especially servers. It manages the interface between system management software and platform hardware.

The implications of a compromised BMC are severe:

  • Attackers can chain multiple BMC exploits to implant malicious code directly into the BMC’s firmware, making their presence extremely difficult to detect and allowing them to survive OS reinstalls or even disk replacements.
  • By operating below the OS, attackers can evade endpoint protection, logging, and most traditional security tools.
  • With BMC access,attackers can remotely power on or off,reboot,or reimage the server,regardless of the primary operating system’s state.
  • Attackers can scrape credentials stored on the system, including those used for remote management, and use the BMC as a launchpad to move laterally within the network.
  • BMCs often have access to system memory and network interfaces, enabling attackers to sniff sensitive data or exfiltrate information without detection.
  • attackers with BMC access can intentionally corrupt firmware, rendering servers unbootable and causing significant operational disruption.

Attribution and Affected Vendors

while specific details of the ongoing attacks remain scarce, Eclypsium suggests that espionage groups, possibly with ties to the chinese government, are the most likely culprits. These groups have a track record of exploiting firmware vulnerabilities to gain persistent access to high-value targets.

The vulnerable AMI MegaRAC devices utilize an interface known as Redfish. Server manufacturers known to use these products include AMD, Ampere Computing, ASRock, ARM, Fujitsu, Gigabyte, Huawei, Nvidia, Supermicro, and Qualcomm. Patches have been released by some,but not all,of these vendors.

Pro Tip: Regularly check your server manufacturer’s website for security advisories and firmware updates related to BMC vulnerabilities.

Immediate Actions for System Administrators

Given the potential for widespread damage, system administrators are urged to take immediate action. Examine all BMCs within their networks to determine vulnerability status. If unsure, consult directly with the server manufacturer. Prioritize applying available patches to mitigate the risk.

The Growing Threat of Firmware Vulnerabilities

The exploitation of BMC vulnerabilities highlights a growing trend: attackers are increasingly targeting firmware to establish a persistent foothold within compromised systems. Firmware,being low-level software embedded in hardware,often lacks the robust security measures found in operating systems and applications. This makes it an attractive target for sophisticated threat actors.

According to a 2024 report by the National Institute of Standards and Technology (NIST), firmware vulnerabilities have increased by over 300% in the past five years, underscoring the urgent need for improved firmware security practices NIST.

Vulnerability Description potential Impact Mitigation
CVE-2024-54085 BMC Firmware Exploit Firmware Implants, Remote Control, Data Exfiltration, System Corruption Apply Patches, Consult Manufacturer

Looking Ahead: Strengthening BMC Security

The current BMC vulnerability serves as a stark reminder of the importance of proactive security measures. Organizations must prioritize firmware security alongside traditional software and network defenses. This includes implementing robust vulnerability management programs, regularly patching firmware, and employing advanced threat detection tools capable of identifying malicious activity at the firmware level.

What steps are you taking to secure your server infrastructure against firmware vulnerabilities? How can the industry collaborate to improve BMC security standards?

evergreen Insights: Understanding BMCs and Their Role in Server Management

Baseboard Management Controllers (BMCs) are essential components in modern server infrastructure. They provide out-of-band management capabilities,allowing administrators to remotely monitor and control servers regardless of the operating system’s state. This includes tasks such as powering on/off servers, performing remote reboots, and accessing system logs.

Historically, BMCs have been largely overlooked from a security perspective. Though, as attackers increasingly target firmware, the security of BMCs has become a critical concern. A compromised BMC can provide attackers with complete control over a server, allowing them to bypass traditional security measures and establish a persistent presence within the network.

Frequently Asked Questions About BMC Vulnerabilities

What is a BMC vulnerability?

A BMC (Baseboard Management Controller) vulnerability is a weakness in the BMC firmware that can be exploited by attackers to gain unauthorized access and control over a server.

What is CVE-2024-54085?

CVE-2024-54085 is a specific vulnerability identified and added by CISA to its catalog of known exploited vulnerabilities. It affects certain Baseboard Management Controllers (BMCs).

What are the potential impacts of exploiting this BMC vulnerability?

Exploiting this BMC vulnerability could allow attackers to implant malicious code into the BMC firmware, evade security measures, remotely control servers, steal credentials, and even corrupt firmware, leading to significant operational disruptions.

Which server manufacturers are affected by this BMC vulnerability?

Server manufacturers known to use the vulnerable AMI MegaRAC devices include AMD, Ampere Computing, ASRock, ARM, fujitsu, Gigabyte, Huawei, nvidia, Supermicro, and Qualcomm. It is crucial to check with your specific manufacturer to determine if your systems are affected.

How can I protect my servers from this BMC vulnerability?

Administrators should examine all BMCs in their fleets to ensure they aren’t vulnerable and consult with their manufacturer to determine if their networks are exposed. Applying available patches is crucial.

Why is BMC security important?

BMC security is critical because BMCs provide low-level access to servers,allowing attackers to bypass traditional security measures and gain persistent control. Securing BMCs is essential for maintaining the integrity and availability of server infrastructure.

Stay informed and proactive! Share this article to raise awareness about the critical BMC vulnerability and its potential impact. Subscribe to our newsletter for the latest cybersecurity updates.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

×
Avatar
World Today News
World Today News Chatbot
Hello, would you like to find out more details about Critical Server Flaw Exploited: Full Fleet Control at Risk ?
 

By using this chatbot, you consent to the collection and use of your data as outlined in our Privacy Policy. Your data will only be used to assist with your inquiry.

OSZAR »