Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

CISA Warns AMI BMC Vulnerability Exploited in the Wild

Posted on June 26, 2025June 26, 2025 By CWS

The US cybersecurity company CISA on Wednesday warned {that a} latest important AMI BMC vulnerability and a FortiOS bug patched over half a decade in the past have been exploited within the wild.

Tracked as CVE-2024-54085 (CVSS rating of 10/10), the AMI BMC flaw is an authentication bypass problem confirmed to influence HPE, Asus, Asrock, and Lenovo merchandise.

Impacting the Redfish administration interface, the safety defect might permit attackers to take management of the goal machine, deploy malware, modify its firmware, and even harm the motherboard.

AMI launched patches for the CVE in March, when a number of OEMs printed advisories to verify influence. On Wednesday, CISA added it to its Recognized Exploited Vulnerabilities (KEV) catalog, warning of its in-the-wild exploitation.

Per Binding Operational Directive (BOD) 22-01, federal companies have till July 17 to establish weak merchandise inside their environments and apply the out there patches.

There don’t look like any public studies describing assaults involving the exploitation of CVE-2024-54085. A Shodan search performed on the time of its disclosure confirmed that greater than 1,000 internet-exposed techniques could have been weak to assaults. 

Tracked as CVE-2019-6693 (CVSS rating of 6.5), the FortiOS safety defect exists as a result of a cryptographic key used to encrypt delicate knowledge is hardcoded within the software program.

An attacker with information of the important thing and entry to backup recordsdata might decipher the delicate info, together with passwords, passphrases for personal keys, and the Excessive Availability password.Commercial. Scroll to proceed studying.

The flaw was publicly disclosed in June 2020, together with two related points in FortiManager and FortiAnalyzer.

Fortinet addressed the problem in FortiOS variations 5.6.11 and above, 6.0.7 and above, and 6.2.1 and above, which permit directors to decide on to be prompted for a password for use for the encryption of knowledge in configuration recordsdata.

It’s price noting that there have been no different studies of those vulnerabilities being exploited earlier than CISA added them to its KEV listing, though technical particulars on how the FortiOS flaw may very well be abused for knowledge deciphering have been printed final 12 months.

The cybersecurity company additionally added a safety defect in discontinued D-Hyperlink DIR-859 routers to KEV. Tracked as CVE-2024-0769 (CVSS rating of 9.8) and described as a path traversal problem, the bug has been exploited within the wild for roughly a 12 months.

Associated: Organizations Warned of Vulnerability Exploited In opposition to Discontinued TP-Hyperlink Routers

Associated: Exploitation Lengthy Recognized for Most of CISA’s Newest KEV Additions

Associated: CISA Warns of Ivanti EPM Vulnerability Exploitation

Security Week News Tags:AMI, BMC, CISA, Exploited, Vulnerability, Warns, Wild

Post navigation

Previous Post: Central Kentucky Radiology Data Breach Impacts 167,000
Next Post: Why Built-In Protections Aren’t Enough for Modern Data Resilience

Related Posts

Docker Desktop Vulnerability Leads to Host Compromise Security Week News
Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 Security Week News
In Other News: Docker AI Attack, Google Sues Chinese Cybercriminals, Coupang Hacked by Employee Security Week News
Hacker Conversations: Kunal Agarwal and the DNA of a Hacker Security Week News
Chrome 137 Update Patches High-Severity Vulnerabilities Security Week News
Hackers Exploit Zero-Day in Discontinued D-Link Devices Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Expose All User Records from Popular Dark Web Forum
  • China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
  • xRAT Malware Attacking Windows Users Disguised as Adult Game
  • Fog Ransomware Attacking US Organizations Leveraging Compromised VPN Credentials
  • In Other News: 8,000 Ransomware Attacks, China Hacked US Gov Emails, IDHS Breach Impacts 700k

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark