In this week's Security Advisory:
- AMI BMC Vulnerability Exposes Servers to Full Takeover
- Cisco Patches Ten IOS XR Vulnerabilities
- Nvidia Patches Rivia Vulnerabilities
- SAP Releases March Patch Cycle
- Meta Warns of FreeType Vulnerability at Risk of Exploitation
A critical vulnerability has been discovered in AMI's MegaRAC Baseboard Management Controller (BMC) software that could allow an attacker to bypass authentication. The vulnerability, CVE-2024-54085 (CVSS 10/10), can be exploited by a local or remote attacker by exploiting the remote management interface or via the BMC interface. Once compromised the threat actor would have full access to the server.
Affected Versions
- HPE Cray XD670 - Prior to BMC v1.19.
- Asus RS720A-E11-RS24U.
- ASRockRack
- HS630X V2.
- HS350X V3.
More Reading/Information
- https://thehackernews.com/2025/03/new-critical-ami-bmc-vulnerability.html
- https://www.securityweek.com/critical-ami-bmc-vulnerability-exposes-servers-to-disruption-takeover/
Cisco Patches Ten IOS XR Vulnerabilities
Cisco has released patches for ten vulnerabilities affecting its IOS XR software, five of which, when exploited, result in a DoS condition. The most severe DoS flaws are CVE-2025-20142
Affected Versions
- A full list of the affected versions can be found here
More Reading/Information
- https://www.bleepingcomputer.com/news/security/cisco-vulnerability-lets-attackers-crash-bgp-on-ios-xr-routers/
- https://sec.cloudapps.cisco.com/security/center/publicationListing.x
Nvidia Patches Rivia Vulnerabilities
Nvidia released patches for two vulnerabilities in their Rivia service. Rivia is a multilingual translation service for building AI language models. Both vulnerabilities, CVE-2025-23242 (CVSS 7.3/10) and CVE-2025-23242 (CVSS 6.5/10) are improper access control issues. Successful exploitation could lead to privilege escalation, data tempering, denial of service, or information disclosure.
Affected Versions
- All versions up to and including 2.18.0.
More Reading/Information
- https://nvidia.custhelp.com/app/answers/detail/a_id/5625
- https://www.securityweek.com/nvidia-riva-vulnerabilities-allow-unauthorized-use-of-ai-services/
SAP Releases March Patch Cycle
SAP released its March patch bundle and it included twenty-one new vulnerabilities affecting its Commerce, NetWeaver, and Commerce Cloud products. The highest severity vulnerabilities are CVE-2025-27434 and CVE-2025-26661 (CVSS 8.8/10), which are XSS vulnerabilities that can lead to an unauthenticated attacker injecting malicious code.
Affected Versions
- A full list of affected versions can be found here
More Reading/Information
- https://support.sap.com/en/my-support/knowledge-base/security-notes-news/march-2025.html
- https://www.securityweek.com/sap-patches-high-severity-vulnerabilities-in-commerce-netweaver/
Meta Warns of FreeType Font at Risk of Exploitation
Meta warned of a security vulnerability that impacts the FreeType open-source font rendering library and that it may be under active exploit in the wild. The vulnerability, CVE-2025-27363 (CVSS 8.1/10), is described as an out-of-bounds write flaw that could be exploited to achieve arbitrary remote code execution.
Affected Versions
- AlmaLinux
- Alpine Linux
- Amazon Linux 2
- Debian stable / Devuan
- RHEL / CentOS Stream / Alma Linux / etc. 8 and 9
- GNU Guix
- Mageia
- OpenMandriva
- openSUSE Leap
- Slackware
- Ubuntu 22.04
More Reading/Information
- https://thehackernews.com/2025/03/meta-warns-of-freetype-vulnerability.html
- https://lists.nongnu.org/archive/html/freetype-devel/2025-03/msg00000.html
Recommendations
Please review your environment to ensure the above-mentioned issues are patched in a timely manner. It is security best practice to regularly update and/or patch software to the latest versions. The vulnerabilities above highlight the security benefits of limiting deployed software to "vendor-supported versions" only. This dramatically increases the likelihood that new vulnerabilities have a patch issued for them. Likewise, Cybersafe strongly encourages maintaining an inventory of current software in your environment, which helps ensure and inform your patch and vulnerability management program.