Dell, then again, has confirmed that its methods are unaffected by the MegaRAC problem, because it makes use of its personal Built-in Dell Distant Entry Controller (iDRAC) in its servers.
How may attackers exploit the flaw?
Every week after the patch was posted by AMI in March, Eclypsium, the corporate that found the vulnerability in late 2024, revealed extra particulars of its interior workings:
“To our information, the vulnerability solely impacts AMI’s BMC software program stack. Nonetheless, since AMI is on the prime of the BIOS provide chain, the downstream influence impacts over a dozen producers,” wrote Eclypsium researchers.
The flaw, scored on the most severity of 10, is designated a ‘crucial’ flaw on CVSS. It will permit bypass authentication by means of the Redfish interface, in line with Eclypsium, with a spread of outcomes, together with distant management of the server, deployment of malware/ransomware, and harmful actions reminiscent of unstoppable reboot loops and even bricked motherboards.
In brief, it might not be day for victims, though no exploitation of the vulnerability has to date been detected. However as with all software program vulnerability, what counts is the velocity and ease with which it’s patched.
The primary problem illustrated by the apparently gradual response to CVE-2024-54085 is the complexity of the patching course of when the software program concerned is a part of a provide chain involving multiple vendor.



