Critical Remote Control Vulnerability Discovered in ASUS Server Hardware

Photo of author

CyberSecureFox Editorial Team

Cybersecurity researchers at Eclypsium have uncovered a severe security vulnerability (CVE-2024-54085) affecting ASUS server hardware that could enable attackers to gain complete remote control over affected systems. The vulnerability resides in the MegaRAC Baseboard Management Controller (BMC) firmware developed by American Megatrends International (AMI), a widely-adopted solution across multiple server hardware manufacturers.

Understanding the Security Impact and Attack Vectors

The vulnerability exploits weaknesses in the Redfish remote management interfaces, presenting significant risks to enterprise infrastructure. Successful exploitation could allow unauthorized actors to execute various malicious activities, ranging from malware deployment to permanent hardware damage through power management manipulation. The severity of this vulnerability is particularly concerning due to its potential for both local and remote exploitation scenarios.

Technical Analysis of CVE-2024-54085

The vulnerability’s attack surface encompasses multiple critical server management components:

  • Unauthorized access to Redfish management interfaces
  • BMC firmware compromise capabilities
  • BIOS/UEFI security bypass methods
  • Direct manipulation of hardware power management systems

Affected Systems and Security Mitigations

The vulnerability impacts server hardware from several major manufacturers, including ASUS, HPE, and ASRock. ASUS has proactively released firmware updates for four affected motherboard models. System administrators are strongly advised to implement a comprehensive security strategy, including:

  • Immediate installation of available firmware patches
  • Implementation of network segmentation for management interfaces
  • Regular security audits of BMC configurations
  • Strict access control policies for management interfaces

Organizations operating affected server hardware should prioritize the implementation of these security measures to protect against potential exploitation. The widespread adoption of AMI’s MegaRAC BMC software makes this vulnerability particularly concerning for enterprise environments. Regular monitoring of vendor security advisories and prompt application of security updates remain crucial for maintaining robust server infrastructure security posture.


CyberSecureFox Editorial Team

The CyberSecureFox Editorial Team covers cybersecurity news, vulnerabilities, malware campaigns, ransomware activity, AI security, cloud security, and vendor security advisories. Articles are prepared using official advisories, CVE/NVD data, CISA alerts, vendor publications, and public research reports. Content is reviewed before publication and updated when new information becomes available.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.