First published: Tue Jan 09 2024(Updated: )
AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause a stack-based buffer overflow via an adjacent network. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
Credit: biossecurity@ami.com
Affected Software | Affected Version | How to fix |
---|---|---|
AMI MegaRAC SPX | >=12<12.7 | |
AMI MegaRAC SPX | >=13<13.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3043 is assessed as a critical vulnerability due to its potential for stack-based buffer overflow leading to significant security risks.
To fix CVE-2023-3043, update the AMI MegaRAC SP-x firmware to the latest version provided by the manufacturer.
CVE-2023-3043 may lead to a loss of confidentiality, integrity, and availability of the affected systems due to successful exploitation.
CVE-2023-3043 affects AMI MegaRAC SP-x versions 12.0 to 12.7 and 13.0 to 13.6.
CVE-2023-3043 can be exploited by an attacker with access to the adjacent network targeting vulnerable BMCs.