First published: Tue Jan 09 2024(Updated: )
AMI’s SPx contains a vulnerability in the BMC where an Attacker may cause a stack-based buffer overflow via an adjacent network. A successful exploitation of this vulnerability may lead to a loss of confidentiality, integrity, and/or availability.
Credit: biossecurity@ami.com
Affected Software | Affected Version | How to fix |
---|---|---|
AMI MegaRAC SPX | >=12<12.7 | |
AMI MegaRAC SPX | >=13<13.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37293 has a high severity level due to potential stack-based buffer overflow exploitation.
To remediate CVE-2023-37293, update the affected AMI MegaRAC SP-X software to the latest version that addresses this vulnerability.
CVE-2023-37293 affects AMI MegaRAC SP-X versions 12.0 to 12.7 and 13.0 to 13.6.
Exploitation of CVE-2023-37293 may lead to loss of confidentiality, integrity, and availability of the system.
Yes, CVE-2023-37293 can be exploited via an adjacent network by an attacker.