• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Additional Supply Chain Vulnerabilities Uncovered in AMI MegaRAC BMC Software

You are here: Home / Cyber Security News / Additional Supply Chain Vulnerabilities Uncovered in AMI MegaRAC BMC Software

Two extra supply chain security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software, approximately two months right after three security vulnerabilities have been introduced to mild in the identical product or service.

Firmware security organization Eclypsium explained the two shortcomings were held back again until eventually now to supply AMI supplemental time to engineer ideal mitigations.

The issues, collectively tracked as BMC&C, could act as springboard for cyber attacks, enabling risk actors to get hold of distant code execution and unauthorized system accessibility with superuser permissions.

The two new flaws in problem are as follows –

  • CVE-2022-26872 (CVSS rating: 8.3) – ​​Password reset interception by using API
  • CVE-2022-40258 (CVSS score: 5.3) – Weak password hashes for Redfish and API

Specifically, MegaRAC has been discovered to use the MD5 hashing algorithm with a world salt for more mature gadgets, or SHA-512 with for every person salts on more recent appliances, possibly allowing a threat actor to crack the passwords.

CVE-2022-26872, on the other hand, leverages an HTTP API to dupe a consumer into initiating a password reset by means of a social engineering attack, and established a password of the adversary’s alternative.

CVE-2022-26872 and CVE-2022-40258 add to 3 other vulnerabilities disclosed in December, including CVE-2022-40259 (CVSS rating: 9.9), CVE-2022-40242 (CVSS score: 8.3), and CVE-2022-2827 (CVSS score: 7.5).

It can be worth pointing out that the weaknesses are exploitable only in scenarios exactly where the BMCs are uncovered to the internet or in scenarios wherever the risk actor has presently gained first accessibility into a data middle or administrative network by other procedures.

The blast radius of BMC&C is at the moment unknown, but Eclypsium explained it truly is operating with AMI and other parties to determine the scope of impacted solutions and providers.

Gigabyte, Hewlett Packard Organization, Intel, and Lenovo have all unveiled updates to deal with the security flaws in their units. NVIDIA is expected to ship a resolve in May well 2023.

“The affect of exploiting these vulnerabilities consist of remote control of compromised servers, distant deployment of malware, ransomware and firmware implants, and server physical destruction (bricking),” Eclypsium mentioned.

Identified this short article intriguing? Observe us on Twitter  and LinkedIn to read much more unique articles we article.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: «AllTech.News The thermodynamics of quantum computing
Next Post: Hackers Abused Microsoft’s “Verified Publisher” OAuth Apps to Hack Corporate Email Accounts »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hackers Use Leaked Shellter Tool License to Spread Lumma Stealer and SectopRAT Malware
  • Anatsa Android Banking Trojan Hits 90,000 Users with Fake PDF App on Google Play
  • Malicious Pull Request Infects 6,000+ Developers via Vulnerable Ethcode VS Code Extension
  • 5 Ways Identity-based Attacks Are Breaching Retail
  • RondoDox Botnet Exploits Flaws in TBK DVRs and Four-Faith Routers to Launch DDoS Attacks

Copyright © 2025 · AllTech.News, All Rights Reserved.