enardeitjaptrues

Researchers have found three vulnerabilities in AMI MegaRAC, a baseband management controller (BMC) firmware used by multiple server manufacturers. If exploited, the flaws could allow attackers to remotely control servers, deploy malware and firmware implants, or trigger damaging actions that leave them inoperable.

BMCs are microcontrollers present on server motherboards that have their own firmware, dedicated memory, power, and network ports and are used for out-of-band management of servers when their main operating systems are shut down. They are essentially small independent computers running inside bigger computers that allow administrators to remotely perform a variety of maintenance and diagnostic tasks including reinstalling operating systems, restarting servers when they’re unresponsive, deploying firmware updates and more.

These “lights out” management capabilities are critical for IT administrators, especially when dealing with private cloud infrastructures in remote data centers, but they can become a huge security risk if they’re left unprotected and reachable by potential attackers. Unfortunately, over the years, researchers have found vulnerabilities in BMC implementations from multiple server vendors and some of the flaws have even been adopted by sophisticated threat actors.

In 2019, researchers from security company Eclypsium found a serious vulnerability in the BMC used by Supermicro servers. At the time, over 47,000 Supermicro BMC interfaces were exposed to the internet. Earlier this year, an Iranian security firm reported a malicious implant dubbed iLOBleed being deployed on Hewlett Packard Enterprise (HPE) Gen8 and Gen9 through known vulnerabilities in HPE iLO (HPE's Integrated Lights-Out) BMC. A scan showed that 7,799 HPE iLO interfaces were exposed to the internet at the time.

Arbitrary code execution and default admin credentials in AMI MegaRAC

MegaRAC is a BMC software implementation developed by American Megatrends (AMI), which is also one of the largest providers of UEFI/BIOS firmware for computers. Manufacturers known to have used MegaRAC BMC in at least some of their products include AMD, Ampere Computing, ASRock, Asus, ARM, Dell EMC, Gigabyte, Hewlett-Packard Enterprise, Huawei, Inspur, Lenovo, NVidia, Qualcomm, Quanta, and Tyan.

The flaws, found by researchers from Eclypsium, are exploitable through Redfish, a standardized RESTful API that can be used to manage servers, storage, networking, and other infrastructure and is implemented by the MegaRAC BMC software – as well as the BMC of many other server vendors.