Ami Security Vulnerabilities (CVEs)

Track 28 security vulnerabilities affecting Ami products and software. Get instant email alerts when new CVEs are discovered, automated security monitoring, and patch guidance.

5 Critical
19 High
4 Medium
🔔 Get Alerts for Ami
CVE-2025-58770 8.8

CVE-2025-58770 is a BIOS vulnerability in AMI APTIOV firmware that allows local attackers to bypass permission checks and escalate privileges. This af...

Dec 12, 2025
CVE-2025-22831 7.8

CVE-2025-22831 is an out-of-bounds write vulnerability in AMI APTIOV BIOS firmware that allows local attackers to corrupt data and disrupt system avai...

Oct 14, 2025
CVE-2025-22833 7.3

This CVE describes a buffer overflow vulnerability in AMI APTIOV BIOS firmware where an attacker with local access can execute arbitrary code by explo...

Oct 14, 2025
CVE-2025-33045 8.2

This CVE describes vulnerabilities in APTIOV BIOS firmware where a privileged local user can write arbitrary data to memory locations and access sensi...

Sep 9, 2025
CVE-2025-22834 4.2

This CVE describes an improper initialization vulnerability in AMI APTIOV BIOS that allows local attackers to leave system resources in unexpected sta...

Aug 12, 2025
CVE-2025-22830 6.7

This CVE describes a race condition vulnerability in AMI APTIOV BIOS that allows a skilled local attacker to cause resource exhaustion. Exploitation c...

Aug 12, 2025
CVE-2025-33043 5.8

This CVE describes an improper input validation vulnerability in AMI APTIOV BIOS firmware. An attacker with local access can exploit this to potential...

May 29, 2025
CVE-2024-42446 7.5

This CVE describes a Time-of-check Time-of-use (TOCTOU) race condition vulnerability in AMI's APTIOV BIOS firmware. An attacker with local access can ...

May 13, 2025
CVE-2024-54084 7.5

This CVE describes a Time-of-check Time-of-use (TOCTOU) race condition vulnerability in AMI's APTIOV BIOS firmware. An attacker with local access can ...

Mar 11, 2025
CVE-2024-54085 9.8

CVE-2024-54085 is a critical authentication bypass vulnerability in AMI's SPx BMC firmware that allows remote attackers to gain unauthorized access th...

Mar 11, 2025
CVE-2024-33659 8.8

This vulnerability in AMI APTIOV BIOS allows a local attacker to exploit improper input validation, potentially leading to arbitrary memory overwrites...

Feb 11, 2025
CVE-2024-42444 7.5

CVE-2024-42444 is a TOCTOU race condition vulnerability in AMI APTIOV BIOS that allows local attackers to execute arbitrary code on affected devices. ...

Jan 14, 2025
CVE-2024-42442 7.2

CVE-2024-42442 is a memory buffer vulnerability in AMI APTIOV BIOS that allows network-based attackers to execute arbitrary code outside System Manage...

Nov 12, 2024
CVE-2024-33660 4.3

This vulnerability allows an attacker with physical access to manipulate SPI flash memory without detection, potentially compromising system integrity...

Nov 12, 2024
CVE-2024-2315 7.1

This vulnerability in AMI AptioV BIOS allows local attackers to bypass access controls and modify SPI flash memory, potentially installing persistent ...

Nov 12, 2024
CVE-2024-33657 7.8

This SMM (System Management Mode) vulnerability allows privileged attackers to execute arbitrary code, manipulate stack memory, and leak information f...

Aug 21, 2024
CVE-2023-37297 8.3

This vulnerability in AMI's SPx BMC allows attackers on adjacent networks to trigger heap memory corruption via CWE-122 (Heap-based Buffer Overflow). ...

Jan 9, 2024
CVE-2023-3043 9.6

This vulnerability in AMI's SPx BMC allows attackers on adjacent networks to trigger a stack-based buffer overflow. Successful exploitation could comp...

Jan 9, 2024
CVE-2023-37293 9.6

This vulnerability in AMI's SPx BMC firmware allows attackers on adjacent networks to trigger a stack-based buffer overflow. Exploitation could lead t...

Jan 9, 2024
CVE-2023-37295 8.3

This vulnerability in AMI's SPx BMC allows attackers on adjacent networks to cause heap memory corruption, potentially leading to remote code executio...

Jan 9, 2024
CVE-2023-34332 7.8

This vulnerability in AMI's SPx BMC allows attackers on the local network to exploit an untrusted pointer dereference, potentially compromising the Ba...

Jan 9, 2024
CVE-2023-39539 7.5

This vulnerability in AMI AptioV BIOS allows local attackers to upload malicious PNG logo files without proper validation, potentially compromising sy...

Dec 6, 2023
CVE-2023-39535 7.5

This CVE describes an improper input validation vulnerability in AMI AptioV BIOS that allows attackers on the local network to exploit the system. Suc...

Nov 14, 2023
CVE-2023-39537 7.5

This vulnerability in AMI AptioV BIOS allows attackers on the local network to exploit improper input validation, potentially compromising system conf...

Nov 14, 2023
CVE-2023-34329 9.1

This vulnerability in AMI MegaRAC SPx12 BMC allows attackers to bypass authentication by spoofing HTTP headers, potentially gaining unauthorized acces...

Jul 18, 2023
CVE-2023-34338 7.1

AMI SPx BMC firmware contains hard-coded cryptographic keys and certificates, allowing attackers to potentially decrypt sensitive data, impersonate le...

Jul 5, 2023
CVE-2023-28863 9.1

CVE-2023-28863 is an insufficient verification of data authenticity vulnerability in AMI MegaRAC SPx12 and SPx13 baseboard management controllers (BMC...

Apr 18, 2023
CVE-2023-25191 7.5

AMI MegaRAC SPX devices allow password disclosure through Redfish interfaces, enabling attackers to retrieve credentials. This affects organizations u...

Feb 15, 2023

Why Monitor Ami Security Vulnerabilities?

Real-time CVE tracking: Our automated system monitors 28+ known vulnerabilities affecting Ami products and software packages. Stay ahead of emerging threats with instant email notifications when new security issues are discovered.

Automated security monitoring: Unlike manual CVE checking, FixTheCVE automatically scans your servers and detects vulnerable Ami packages in under 60 seconds. No agents required - completely agentless scanning that works across Ami deployments.

Free vulnerability database: Access detailed information about every Ami CVE including CVSS scores, severity ratings, affected versions, and actionable patch guidance. Filter by critical, high, medium, or low severity to prioritize your security remediation efforts.

🚀 Get Started in 60 Seconds

  • Register free account & add your servers
  • Run one-time scan or schedule automatic monitoring (every 1-24 hours)
  • Receive instant alerts when new Ami CVEs affect your systems
  • Access dashboard with severity breakdown & fix instructions
Start Monitoring Ami CVEs Free