- Description
- AMI BMC contains a vulnerability in the SPX REST API, where an attacker with the required privileges can read and write to arbitrary locations within the memory context of the IPMI server process, which may lead to code execution, denial of service, information disclosure, or data tampering.
- Source
- biossecurity@ami.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ami:megarac_sp-x:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BBB7BA77-D5E4-4A28-A164-246D13264E74",
"versionEndExcluding": "12.7",
"versionStartIncluding": "12.0"
},
{
"criteria": "cpe:2.3:a:ami:megarac_sp-x:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7A29A821-0C82-47A1-8345-7B367F88EEF8",
"versionEndExcluding": "13.5",
"versionStartIncluding": "13.0"
}
],
"operator": "OR"
}
]
}
]