Vulnerabilities Exploited in AMI MegaRAC
This is a news story, published by Ars Technica, that relates primarily to US Cybersecurity news.
News about operating systems
For more operating systems news, you can click here:
more operating systems newsArs Technica news
For more news from Ars Technica, you can click here:
more news from Ars TechnicaAbout the Otherweb
Otherweb, Inc is a public benefit corporation, dedicated to improving the quality of news people consume. We are non-partisan, junk-free, and ad-free. We use artificial intelligence (AI) to remove junk from your news feed, and allow you to select the best tech news, business news, entertainment news, and much more. If you like this article about operating systems, you might also like this article about
vulnerable BMC device. We are dedicated to bringing you the highest-quality news, junk-free and ad-free, about your favorite topics. Please come every day to read the latest vulnerability news, US Cybersecurity news, news about operating systems, and other high-quality news about any topic that interests you. We are working hard to create the best news aggregator on the web, and to put you in control of your news feed - whether you choose to read the latest news through our website, our news app, or our daily newsletter - all free!
severity vulnerabilityArs Technica
•Technology
Technology
Actively exploited vulnerability gives extraordinary control over server fleets

65% Informative
US Cybersecurity and Infrastructure Security Agency warns of maximum-severity vulnerability.
The vulnerability resides in the AMI MegaRAC, a widely used firmware package that allows large fleets of servers to be remotely accessed and managed even when power is unavailable or the operating system isn't functioning.
It allows for authentication bypasses by making a simple web request to a vulnerable BMC device over HTTP .
VR Score
53
Informative language
47
Neutral language
16
Article tone
formal
Language
English
Language complexity
84
Offensive language
possibly offensive
Hate speech
not hateful
Attention-grabbing headline
not detected
Known propaganda techniques
not detected
Time-value
short-lived
External references
1
Source diversity
1
Affiliate links
no affiliate links