Vulnerability Under Active Exploitation Grants Unprecedented Control Over Server Networks

On Wednesday, the Cybersecurity and Infrastructure Security Agency (CISA) identified CVE-2024-54085 as a newly recognized vulnerability actively being exploited in the wild. While the specifics surrounding this vulnerability remain undisclosed, its implications have raised significant concern among cybersecurity experts.

Research conducted by Eclypsium highlighted the wide-ranging repercussions of these exploits. The vulnerabilities primarily affect Baseboard Management Controllers (BMCs), critical components that manage servers independently of the primary operating system. The potential for attackers to leverage these weaknesses is alarming, as they can execute complex, multi-layered attacks. By implanting malicious code into the firmware of BMCs, adversaries can maintain covert access to systems even through operating system reinstalls or hardware replacements.

The low-level operation of BMCs offers attackers a distinct advantage, permitting them to bypass traditional security measures such as endpoint protection and logging systems. With access to BMCs, intruders can remotely control server operations, including powering on, rebooting, or reinstalling operating systems, regardless of the current state of the primary OS. Additionally, these attackers might extract sensitive credentials stored on the system, further enabling lateral movement across networked environments.

Moreover, BMCs typically interface with system memory and network components, presenting an opportunity for attackers to intercept sensitive data or exfiltrate valuable information undetected. Even more concerning is the potential for malicious actors to deliberately corrupt firmware, which could lead to unbootable systems and significant operational disruptions.

As of now, there are no publicly available details about the specific groups executing these attacks. However, Eclypsium posits that state-sponsored espionage groups, particularly those associated with the Chinese government, are the most likely perpetrators. The identified Advanced Persistent Threat (APT) groups noted by Eclypsium have established records of exploiting firmware vulnerabilities, targeting high-value organizations with persistent access strategies.

The vulnerability primarily stems from several devices utilizing the AMI MegaRAC platform, which operates via the Redfish management interface. Major server manufacturers, including AMD, Fujitsu, and Supermicro, among others, have integrated these devices into their products. While some of these companies have issued patches, the full extent of the vulnerability’s impact on their clients remains unclear.

In light of the significant risk posed by this vulnerability, IT administrators are urged to scrutinize BMCs within their infrastructures to assess vulnerability exposure. Given the variety of server manufacturers impacted, direct consultations with vendors are advisable to ensure comprehensive protection within their networks.

This troubling development aligns with several tactics outlined in the MITRE ATT&CK framework, specifically initial access, persistence, and privilege escalation—key strategies that adversaries might employ in exploiting these vulnerabilities. Understanding these techniques is crucial for businesses aiming to bolster their security posture in the face of evolving cyber threats.

Source