Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

ASUS Addresses Critical AMI Bug Vulnerability: A Cautionary Tale of Server Security



ASUS has released a fix for a critical AMI bug that allows hackers to brick servers. The vulnerability, CVE-2024-54085, poses a significant threat to server administrators and organizations relying on AMI-powered servers from major hardware vendors. To mitigate the risk of exploitation, server administrators are advised to apply the latest firmware updates as soon as possible.

  • The ASUS AMI-based motherboard management control (BMC) software has a critical bug (CVE-2024-54085) that poses a significant threat to server administrators and organizations.
  • The vulnerability allows attackers to hijack servers, potentially leading to malware infections, firmware modifications, and irreversible physical damage through over-volting.
  • The bug is remotely exploitable, making it an ideal target for hackers seeking to compromise sensitive data or disrupt critical infrastructure.
  • ASUS has released security updates to address the vulnerability, which apply to four specific motherboard models.
  • Server administrators are advised to download and apply the firmware updates as soon as possible to ensure system security.
  • The severity of this vulnerability is significant, and inaction can lead to catastrophic consequences, including data breaches, system downtime, and physical damage.



  • In a recent update to the security landscape, ASUS has taken proactive steps to address a critical bug in their American Megatrends International (AMI) based motherboard management control (BMC) software. The newly identified vulnerability, CVE-2024-54085, poses a significant threat to server administrators and organizations relying on AMI-powered servers from major hardware vendors such as HPE, ASUS, and ASRock.

    The bug's impact was first made public by Eclypsium in a related report, which revealed that it allows attackers to hijack and potentially brick servers. This can result in malware infections, firmware modifications, and irreversible physical damage through over-volting. The vulnerability is remotely exploitable, making it an ideal target for hackers seeking to compromise sensitive data or disrupt critical infrastructure.

    According to ASUS, the company has released security updates to address CVE-2024-54085. These patches apply to four specific motherboard models that were impacted by the bug: PRO WS W790E-SAGE SE version 1.1.57, PRO WS W680M-ACE SE version 1.1.21, PRO WS WRX90E-SAGE SE version 2.1.28, and Pro WS WRX80E-SAGE SE WIFI version 1.34.0.

    To ensure the security of their systems, server administrators are advised to download and apply these firmware updates as soon as possible. The update process involves navigating through the web interface > Maintenance > Firmware Update, selecting the latest BMC firmware update (.ima file), and clicking 'Start Firmware Update.' It is also recommended that users check the 'Full Flash' option for added security.

    The severity of this vulnerability cannot be overstated. Given its ability to perform remote exploitation, it poses a significant threat to organizations relying on vulnerable servers. The consequences of inaction can be catastrophic, including data breaches, system downtime, and even physical damage to server hardware.

    In light of these findings, it is imperative that server administrators take proactive measures to address this vulnerability. By staying informed about the latest security updates and applying them promptly, they can significantly reduce the risk of exploitation. Furthermore, organizations should consider implementing robust security measures, such as intrusion detection systems and regular backups, to mitigate the impact of potential attacks.

    In conclusion, the ASUS-identified AMI bug serves as a stark reminder of the importance of ongoing security awareness and proactive maintenance in the digital age. By staying vigilant and taking swift action in response to emerging threats, organizations can safeguard their critical infrastructure and protect against potential cyber-attacks.

    Related Information:
  • https://www.ethicalhackingnews.com/articles/ASUS-Addresses-Critical-AMI-Bug-Vulnerability-A-Cautionary-Tale-of-Server-Security-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/asus-releases-fix-for-ami-bug-that-lets-hackers-brick-servers/

  • https://nvd.nist.gov/vuln/detail/CVE-2024-54085

  • https://www.cvedetails.com/cve/CVE-2024-54085/


  • Published: Wed Apr 23 10:03:17 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us