Researchers have found three vulnerabilities in AMI MegaRAC, a baseband management controller (BMC) firmware used by multiple server manufacturers. If exploited, the flaws could allow attackers to remotely control servers, deploy malware and firmware implants, or trigger damaging actions that leave them inoperable.
BMCs are microcontrollers present on server motherboards that have their own firmware, dedicated memory, power, and network ports and are used for out-of-band management of servers when their main operating systems are shut down. They are essentially small independent computers running inside bigger computers that allow administrators to remotely perform a variety of maintenance and diagnostic tasks including reinstalling operating systems, restarting servers when they’re unresponsive, deploying firmware updates and more.
More Stories
Windscribe Acquitted on Charges of Not Collecting Users’ Data
The company doesn’t keep logs, so couldn’t turn over data: Windscribe, a globally used privacy-first VPN service, announced today that...
Uyghur Diaspora Group Targeted with Remote Surveillance Malware
Members of the World Uyghur Congress living in exile were targeted with a spear phishing campaign deploying surveillance malware, according...
Half of Mobile Devices Run Outdated Operating Systems
50% of mobile devices run outdated operating systems, increasing vulnerability to cyber-attacks, according to the latest report from Zimperium Read...
Researchers Note 16.7% Increase in Automated Scanning Activity
According to the 2025 Global Threat Landscape Report from FortiGuard, threat actors are executing 36,000 scans per second Read More
2025 Cyber Resilience Research Discovers Speed of AI Advancing Emerging Attack Types
New Global Data Helps Organizations Move to Cyber Resilience and Shatter Silos It is no secret that AI is advancing...
ISACA Highlights Critical Lack of Quantum Threat Mitigation Strategies
An ISACA survey found that just 5% of organizations have a defined strategy to defend against quantum-enabled threats Read More