First published: Tue Jan 09 2024(Updated: )
AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause an untrusted pointer to dereference by a local network. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
Credit: biossecurity@ami.com
Affected Software | Affected Version | How to fix |
---|---|---|
AMI MegaRAC SPX | >=12<12.7 | |
AMI MegaRAC SPX | >=13<13.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34332 is considered to have a high severity due to the potential loss of confidentiality, integrity, and availability that can result from exploitation.
To remediate CVE-2023-34332, users should update the affected AMI MegaRAC SP-x software to versions 12.7 and above or 13.6 and above.
CVE-2023-34332 affects AMI MegaRAC SP-x versions between 12.0 and 12.7 and between 13.0 and 13.6.
Exploitation of CVE-2023-34332 may lead to unauthorized access and manipulation of system resources, compromising security.
CVE-2023-34332 requires local network access for exploitation, meaning it is not remotely exploitable without network access.