📦 Megarac Sp X
by Ami
🔍 What is Megarac Sp X?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
CVE-2024-54085 is a critical authentication bypass vulnerability in AMI's SPx BMC firmware that allows remote attackers to gain unauthorized access through the Redfish Host Interface without credentia...
This vulnerability in AMI's SPx BMC allows attackers on adjacent networks to trigger a stack-based buffer overflow. Successful exploitation could compromise the BMC, potentially leading to complete sy...
This vulnerability in AMI's SPx BMC firmware allows attackers on adjacent networks to trigger a stack-based buffer overflow. Exploitation could lead to remote code execution, compromising the BMC's co...
This vulnerability in AMI MegaRAC SPx12 BMC allows attackers to bypass authentication by spoofing HTTP headers, potentially gaining unauthorized access to baseboard management controllers. This affect...
CVE-2023-28863 is an insufficient verification of data authenticity vulnerability in AMI MegaRAC SPx12 and SPx13 baseboard management controllers (BMCs). This allows attackers to bypass authentication...
This vulnerability in AMI's SPx BMC allows attackers on adjacent networks to trigger heap memory corruption via CWE-122 (Heap-based Buffer Overflow). Successful exploitation could compromise the BMC's...
This vulnerability in AMI's SPx BMC allows attackers on adjacent networks to cause heap memory corruption, potentially leading to remote code execution or system compromise. It affects systems using v...
This vulnerability in AMI's SPx BMC allows attackers on the local network to exploit an untrusted pointer dereference, potentially compromising the Baseboard Management Controller. This affects system...
AMI SPx BMC firmware contains hard-coded cryptographic keys and certificates, allowing attackers to potentially decrypt sensitive data, impersonate legitimate systems, or compromise BMC functionality....
AMI MegaRAC SPX devices allow password disclosure through Redfish interfaces, enabling attackers to retrieve credentials. This affects organizations using vulnerable AMI MegaRAC SPX devices with Redfi...