Close Menu
    Facebook LinkedIn YouTube WhatsApp X (Twitter) Pinterest
    Trending
    • AI Machine-Vision Earns Man Overboard Certification
    • Battery recycling startup Renewable Metals charges up on $12 million Series A
    • The Influencers Normalizing Not Having Sex
    • Sources say NSA is using Mythos Preview, and a source says it is also being used widely within the DoD, despite Anthropic’s designation as a supply chain risk (Axios)
    • Today’s NYT Wordle Hints, Answer and Help for April 20 #1766
    • Scandi-style tiny house combines smart storage and simple layout
    • Our Favorite Apple Watch Has Never Been Less Expensive
    • Vercel says it detected unauthorized access to its internal systems after a hacker using the ShinyHunters handle claimed a breach on BreachForums (Lawrence Abrams/BleepingComputer)
    Facebook LinkedIn WhatsApp
    Times FeaturedTimes Featured
    Monday, April 20
    • Home
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    • More
      • AI
      • Robotics
      • Industries
      • Global
    Times FeaturedTimes Featured
    Home»News»Actively exploited vulnerability gives extraordinary control over server fleets
    News

    Actively exploited vulnerability gives extraordinary control over server fleets

    Editor Times FeaturedBy Editor Times FeaturedJune 27, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp Copy Link

    On Wednesday, CISA added CVE-2024-54085 to its record of vulnerabilities identified to be exploited within the wild. The discover offered no additional particulars.

    In an electronic mail on Thursday, Eclypsium researchers stated the scope of the exploits has the potential to be broad. That scope consists of:

    • Attackers might chain a number of BMC exploits to implant malicious code immediately into the BMC’s firmware, making their presence extraordinarily tough to detect and permitting them to outlive OS reinstalls and even disk replacements.
    • By working under the OS, attackers can evade endpoint safety, logging, and most conventional safety instruments.
    • With BMC entry, attackers can remotely energy on or off, reboot, or reimage the server, whatever the major working system’s state.
    • Attackers can scrape credentials saved on the system, together with these used for distant administration, and use the BMC as a launchpad to maneuver laterally inside the community
    • BMCs typically have entry to system reminiscence and community interfaces, enabling attackers to smell delicate knowledge or exfiltrate info with out detection
    • Attackers with BMC entry can deliberately corrupt firmware, rendering servers unbootable and inflicting vital operational disruption

    With no publicly identified particulars of the continuing assaults, it is unclear which teams could also be behind them. Eclypsium stated the more than likely culprits can be espionage teams engaged on behalf of the Chinese language authorities. All 5 of the precise APT teams Eclypsium named have a historical past of exploiting firmware vulnerabilities or gaining persistent entry to high-value targets.

    Eclypsium stated the road of susceptible AMI MegaRAC units makes use of an interface often known as Redfish. Server makers identified to make use of these merchandise embody AMD, Ampere Computing, ASRock, ARM, Fujitsu, Gigabyte, Huawei, Nvidia, Supermicro, and Qualcomm. Some, however not all, of those distributors have launched patches for his or her wares.

    Given the injury potential from exploitation of this vulnerability, admins ought to look at all BMCs of their fleets to make sure they don’t seem to be susceptible. With merchandise from so many alternative server makers affected, admins ought to seek the advice of with their producer when not sure if their networks are uncovered.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Editor Times Featured
    • Website

    Related Posts

    Sources say NSA is using Mythos Preview, and a source says it is also being used widely within the DoD, despite Anthropic’s designation as a supply chain risk (Axios)

    April 19, 2026

    Vercel says it detected unauthorized access to its internal systems after a hacker using the ShinyHunters handle claimed a breach on BreachForums (Lawrence Abrams/BleepingComputer)

    April 19, 2026

    A look at Dylan Patel’s SemiAnalysis, an AI newsletter and research firm that expects $100M+ in 2026 revenue from subscriptions and AI supply chain research (Abram Brown/The Information)

    April 19, 2026

    Google is in talks with Marvell Technology to develop a memory processing unit that works alongside TPUs, and a new TPU for running AI models (Qianer Liu/The Information)

    April 19, 2026

    At the Beijing half-marathon, several humanoid robots beat human winners by 10+ minutes; a robot made by Honor beat the human world record held by Jacob Kiplimo (Reuters)

    April 19, 2026

    A look at the AI nonprofit METR, whose time-horizon metrics are used by AI researchers and Wall Street investors to track the rapid development of AI systems (Kevin Roose/New York Times)

    April 19, 2026

    Comments are closed.

    Editors Picks

    AI Machine-Vision Earns Man Overboard Certification

    April 20, 2026

    Battery recycling startup Renewable Metals charges up on $12 million Series A

    April 20, 2026

    The Influencers Normalizing Not Having Sex

    April 20, 2026

    Sources say NSA is using Mythos Preview, and a source says it is also being used widely within the DoD, despite Anthropic’s designation as a supply chain risk (Axios)

    April 19, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    About Us
    About Us

    Welcome to Times Featured, an AI-driven entrepreneurship growth engine that is transforming the future of work, bridging the digital divide and encouraging younger community inclusion in the 4th Industrial Revolution, and nurturing new market leaders.

    Empowering the growth of profiles, leaders, entrepreneurs businesses, and startups on international landscape.

    Asia-Middle East-Europe-North America-Australia-Africa

    Facebook LinkedIn WhatsApp
    Featured Picks

    what’s the smarter move for palletizing?

    April 10, 2025

    Mastering Hadoop, Part 3: Hadoop Ecosystem: Get the most out of your cluster

    March 21, 2025

    Sikorsky & Robinson Unveil Autonomous Cargo Helo

    March 12, 2026
    Categories
    • Founders
    • Startups
    • Technology
    • Profiles
    • Entrepreneurs
    • Leaders
    • Students
    • VC Funds
    Copyright © 2024 Timesfeatured.com IP Limited. All Rights.
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • About us
    • Contact us

    Type above and press Enter to search. Press Esc to cancel.