Close Menu
TechurzTechurz

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    What we’re looking for in Startup Battlefield 2026 and how to put your best application forward

    March 30, 2026

    ScaleOps raises $130M to improve computing efficiency amid AI demand

    March 30, 2026

    Qodo raises $70M for code verification as AI coding scales

    March 30, 2026
    Facebook X (Twitter) Instagram
    Trending
    • What we’re looking for in Startup Battlefield 2026 and how to put your best application forward
    • ScaleOps raises $130M to improve computing efficiency amid AI demand
    • Qodo raises $70M for code verification as AI coding scales
    • Elon Musk’s last co-founder reportedly leaves xAI
    • From Moon hotels to cattle herding: 8 startups investors chased at YC Demo Day
    • Aetherflux reportedly raising Series B at $2 billion valuation
    • OpenAI shuts down Sora while Meta gets shut out in court
    • VCs are betting billions on AI’s next wave, so why is OpenAI killing Sora?
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechurzTechurz
    • Home
    • AI
    • Apps
    • News
    • Guides
    • Opinion
    • Reviews
    • Security
    • Startups
    TechurzTechurz
    Home»Security»AMI MegaRAC authentication bypass flaw is being exploitated, CISA warns
    Security

    AMI MegaRAC authentication bypass flaw is being exploitated, CISA warns

    TechurzBy TechurzJune 26, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    datacenter
    Share
    Facebook Twitter LinkedIn Pinterest Email


    The spoofing attack works by manipulating HTTP request headers sent to the Redfish interface. Attackers can add specific values to headers like “X-Server-Addr” to make their external requests appear as if they’re coming from inside the server itself. Since the system automatically trusts internal requests as authenticated, this spoofing technique grants attackers administrator privileges without needing valid credentials.

    Slow vendor response creates risk window

    The vulnerability exemplifies complex enterprise security challenges posed by firmware supply chains. AMI sits at the top of the server supply chain, but each vendor must integrate patches into their own products before customers can deploy them.

    Lenovo took until April 17 to release its patch, while Asus patches for four motherboard models only appeared in recent weeks. Hewlett Packard Enterprise was among the faster responders, releasing updates in March for its Cray XD670 systems used in AI and high-performance computing workloads.

    The patching delays are particularly concerning given the vulnerability’s scope. Manufacturers known to use AMI’s MegaRAC SPx BMC include AMD, Ampere Computing, ASRock, ARM, Fujitsu, Gigabyte, Huawei, Nvidia, Supermicro, and Qualcomm, representing a significant portion of enterprise server infrastructure. NetApp also confirmed in its security advisory NTAP-20250328-0003 that multiple NetApp products incorporating MegaRAC BMC firmware are also affected, expanding the impact to storage infrastructure.

    Dell had earlier confirmed its systems are unaffected since it uses its own iDRAC management technology instead of AMI’s MegaRAC.

    Enterprise operations at risk

    This widespread vendor impact translates into serious operational risks for enterprises. BMCs operate at a privileged level below the main operating system, making attacks particularly dangerous.

    AMI authentication bypass CISA exploitated flaw MegaRAC warns
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleI really want to switch to a MacBook Pro. Here’s why I’m waiting till next year
    Next Article Meta AI can summarize your unread WhatsApp messages now – how to try it
    Techurz
    • Website

    Related Posts

    Opinion

    Yann LeCun’s AMI Labs raises $1.03 billion to build world models

    March 10, 2026
    Opinion

    Google VP warns that two types of AI startups may not survive

    February 21, 2026
    Security

    AI is becoming introspective – and that ‘should be monitored carefully,’ warns Anthropic

    November 3, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    College social app Fizz expands into grocery delivery

    September 3, 20252,288 Views

    A Former Apple Luminary Sets Out to Create the Ultimate GPU Software

    September 25, 202516 Views

    The Reason Murderbot’s Tone Feels Off

    May 14, 202512 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    College social app Fizz expands into grocery delivery

    September 3, 20252,288 Views

    A Former Apple Luminary Sets Out to Create the Ultimate GPU Software

    September 25, 202516 Views

    The Reason Murderbot’s Tone Feels Off

    May 14, 202512 Views
    Our Picks

    What we’re looking for in Startup Battlefield 2026 and how to put your best application forward

    March 30, 2026

    ScaleOps raises $130M to improve computing efficiency amid AI demand

    March 30, 2026

    Qodo raises $70M for code verification as AI coding scales

    March 30, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2026 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.