Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Pricing Choices and Useful Scope

    January 25, 2026

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026

    Conversational AI doesn’t perceive customers — 'Intent First' structure does

    January 25, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»As clock ticks, distributors slowly patch important flaw in AMI MegaRAC BMC firmware
    AI Ethics & Regulation

    As clock ticks, distributors slowly patch important flaw in AMI MegaRAC BMC firmware

    Oliver ChambersBy Oliver ChambersApril 25, 2025No Comments2 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    As clock ticks, distributors slowly patch important flaw in AMI MegaRAC BMC firmware
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link



    Dell, then again, has confirmed that its techniques are unaffected by the MegaRAC challenge, because it makes use of its personal Built-in Dell Distant Entry Controller (iDRAC) in its servers.

    How might attackers exploit the flaw?

    Every week after the patch was posted by AMI in March, Eclypsium, the corporate that found the vulnerability in late 2024, printed extra particulars of its internal workings:

    “To our information, the vulnerability solely impacts AMI’s BMC software program stack. Nevertheless, since AMI is on the prime of the BIOS provide chain, the downstream affect impacts over a dozen producers,” wrote Eclypsium researchers.

    The flaw, scored on the most severity of 10, is designated a ‘important’ flaw on CVSS. It will permit bypass authentication via the Redfish interface, based on Eclypsium, with a vary of outcomes, together with distant management of the server, deployment of malware/ransomware, and harmful actions equivalent to unstoppable reboot loops and even bricked motherboards.

    In brief, it might not be a very good day for victims, though no exploitation of the vulnerability has thus far been detected. However as with every software program vulnerability, what counts is the pace and ease with which it’s patched.

    The primary challenge illustrated by the apparently sluggish response to CVE-2024-54085 is the complexity of the patching course of when the software program concerned is a part of a provide chain involving a couple of vendor.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Oliver Chambers
    • Website

    Related Posts

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026

    FBI Accessed Home windows Laptops After Microsoft Shared BitLocker Restoration Keys – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra

    January 25, 2026

    Multi-Stage Phishing Marketing campaign Targets Russia with Amnesia RAT and Ransomware

    January 25, 2026
    Top Posts

    Pricing Choices and Useful Scope

    January 25, 2026

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025
    Don't Miss

    Pricing Choices and Useful Scope

    By Amelia Harper JonesJanuary 25, 2026

    SweetAI is offered as a chatbot designed for customers in search of interplay that doesn’t…

    The cybercrime business continues to problem CISOs in 2026

    January 25, 2026

    Conversational AI doesn’t perceive customers — 'Intent First' structure does

    January 25, 2026

    FBI Accessed Home windows Laptops After Microsoft Shared BitLocker Restoration Keys – Hackread – Cybersecurity Information, Information Breaches, AI, and Extra

    January 25, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.