Overview
- Description
- AMI BMC contains a vulnerability in the SPX REST API, where an attacker with the required privileges can read and write to arbitrary locations within the memory context of the IPMI server process, which may lead to code execution, denial of service, information disclosure, or data tampering.
- Source
- biossecurity@ami.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ami:megarac_sp-x:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBB7BA77-D5E4-4A28-A164-246D13264E74", "versionEndExcluding": "12.7", "versionStartIncluding": "12.0" }, { "criteria": "cpe:2.3:a:ami:megarac_sp-x:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A29A821-0C82-47A1-8345-7B367F88EEF8", "versionEndExcluding": "13.5", "versionStartIncluding": "13.0" } ], "operator": "OR" } ] } ]