First published: Mon Jun 12 2023(Updated: )
AMI BMC contains a vulnerability in the SPX REST API, where an attacker with the required privileges can read and write to arbitrary locations within the memory context of the IPMI server process, which may lead to code execution, denial of service, information disclosure, or data tampering.
Credit: biossecurity@ami.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ami Megarac Sp-x | >=12.0<12.7 | |
Ami Megarac Sp-x | >=13.0<13.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-34341 is high with a severity value of 8.8.
The affected software of CVE-2023-34341 is Ami Megarac Sp-x version 12.0 to 12.7 and version 13.0 to 13.5.
An attacker with the required privileges can read and write to arbitrary locations within the memory context of the IPMI server process, which may lead to code execution, denial of service, information disclosure, or data tampering.
To fix CVE-2023-34341, it is recommended to apply the patches or updates provided by Ami Megarac Sp-x.
For more information about CVE-2023-34341, you can refer to the security advisory provided by Ami Megarac Sp-x: <link>.