Select Page

Two more supply chain security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software, nearly two months after three security vulnerabilities were brought to light in the same product.

Firmware security firm Eclypsium said the two shortcomings were held back until now to provide AMI additional time to engineer appropriate mitigations.

The issues, collectively tracked as BMC&C, could act as a springboard for cyber attacks, enabling threat actors to obtain remote code execution and unauthorized device access with superuser permissions.

The two new flaws in question are as follows –

  • CVE-2022-26872 (CVSS score: 8.3) – ​​Password reset interception via API
  • CVE-2022-40258 (CVSS score: 5.3) – Weak password hashes for Redfish and API

Specifically, MegaRAC has been found to use the MD5 hashing algorithm with a global salt for older devices, or SHA-512 with per user salts on newer appliances, potentially allowing a threat actor to crack the passwords.

images from Hacker News