Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns AMI BMC Vulnerability Exploited in the Wild

Posted on June 26, 2025June 26, 2025 By CWS

The US cybersecurity company CISA on Wednesday warned {that a} latest important AMI BMC vulnerability and a FortiOS bug patched over half a decade in the past have been exploited within the wild.

Tracked as CVE-2024-54085 (CVSS rating of 10/10), the AMI BMC flaw is an authentication bypass problem confirmed to influence HPE, Asus, Asrock, and Lenovo merchandise.

Impacting the Redfish administration interface, the safety defect might permit attackers to take management of the goal machine, deploy malware, modify its firmware, and even harm the motherboard.

AMI launched patches for the CVE in March, when a number of OEMs printed advisories to verify influence. On Wednesday, CISA added it to its Recognized Exploited Vulnerabilities (KEV) catalog, warning of its in-the-wild exploitation.

Per Binding Operational Directive (BOD) 22-01, federal companies have till July 17 to establish weak merchandise inside their environments and apply the out there patches.

There don’t look like any public studies describing assaults involving the exploitation of CVE-2024-54085. A Shodan search performed on the time of its disclosure confirmed that greater than 1,000 internet-exposed techniques could have been weak to assaults. 

Tracked as CVE-2019-6693 (CVSS rating of 6.5), the FortiOS safety defect exists as a result of a cryptographic key used to encrypt delicate knowledge is hardcoded within the software program.

An attacker with information of the important thing and entry to backup recordsdata might decipher the delicate info, together with passwords, passphrases for personal keys, and the Excessive Availability password.Commercial. Scroll to proceed studying.

The flaw was publicly disclosed in June 2020, together with two related points in FortiManager and FortiAnalyzer.

Fortinet addressed the problem in FortiOS variations 5.6.11 and above, 6.0.7 and above, and 6.2.1 and above, which permit directors to decide on to be prompted for a password for use for the encryption of knowledge in configuration recordsdata.

It’s price noting that there have been no different studies of those vulnerabilities being exploited earlier than CISA added them to its KEV listing, though technical particulars on how the FortiOS flaw may very well be abused for knowledge deciphering have been printed final 12 months.

The cybersecurity company additionally added a safety defect in discontinued D-Hyperlink DIR-859 routers to KEV. Tracked as CVE-2024-0769 (CVSS rating of 9.8) and described as a path traversal problem, the bug has been exploited within the wild for roughly a 12 months.

Associated: Organizations Warned of Vulnerability Exploited In opposition to Discontinued TP-Hyperlink Routers

Associated: Exploitation Lengthy Recognized for Most of CISA’s Newest KEV Additions

Associated: CISA Warns of Ivanti EPM Vulnerability Exploitation

Security Week News Tags:AMI, BMC, CISA, Exploited, Vulnerability, Warns, Wild

Post navigation

Previous Post: Central Kentucky Radiology Data Breach Impacts 167,000
Next Post: Why Built-In Protections Aren’t Enough for Modern Data Resilience

Related Posts

ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact Security Week News
Akira Ransomware Group Made $244 Million in Ransom Proceeds Security Week News
Chinese Hackers Target Chinese Users With RAT, Rootkit Security Week News
F5 Hack: Attack Linked to China, BIG-IP Flaws Patched, Governments Issue Alerts  Security Week News
Microsoft Reduces Israel’s Access to Cloud and AI Products Over Reports of Mass Surveillance in Gaza Security Week News
High-Severity Vulnerabilities Patched in Tenable Nessus Agent Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark