PatchSiren cyber security CVE debrief
CVE-2024-54085 AMI CVE debrief
CVE-2024-54085 is an AMI MegaRAC SPx authentication bypass by spoofing vulnerability that CISA added to the Known Exploited Vulnerabilities catalog on 2025-06-25. Because it is in KEV, defenders should treat it as a priority exposure and follow vendor guidance promptly. CISA’s required action is to apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Vendor
- AMI
- Product
- MegaRAC SPx
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2025-06-25
- Original CVE updated
- 2025-06-25
- Advisory published
- 2025-06-25
- Advisory updated
- 2025-06-25
Who should care
Organizations that deploy AMI MegaRAC SPx directly or indirectly, including server operators, OEMs, infrastructure teams, and any security or operations team responsible for remote management interfaces and dependent products.
Technical summary
The available record identifies the issue as an authentication bypass by spoofing affecting AMI MegaRAC SPx. CISA also notes that the vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation used by different products. No further technical detail or severity score was provided in the supplied corpus.
Defensive priority
High priority. KEV inclusion means known exploitation concern and a short mitigation window: CISA listed the due date as 2025-07-16.
Recommended defensive actions
- Inventory systems and products that use AMI MegaRAC SPx or incorporate it as a component.
- Review the vendor’s mitigation guidance and apply it as soon as feasible.
- If mitigations are unavailable, discontinue use of the affected product or service.
- For cloud services, follow applicable BOD 22-01 guidance.
- Validate whether remote management interfaces or dependent products are exposed in your environment.
Evidence notes
This debrief is based on the supplied CISA KEV record and official vulnerability references. The source corpus provides the CVE title, KEV status, dates, and CISA’s required action language, but does not include a CVSS score or the contents of the vendor advisory.
Official resources
-
CVE-2024-54085 CVE record
CVE.org
-
CVE-2024-54085 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
-
Source item URL
cisa_kev
CVE-2024-54085 was published on 2025-06-25 and added to CISA KEV the same day, with a remediation due date of 2025-07-16 in the supplied record.