PrivacyDigest<p>Actively <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> <a href="https://mas.to/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> gives extraordinary control over <a href="https://mas.to/tags/server" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>server</span></a> fleets<br> <br>The vulnerability, carrying a <a href="https://mas.to/tags/severity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>severity</span></a> rating of 10 out of a possible 10, resides in the <a href="https://mas.to/tags/AMIMegaRAC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AMIMegaRAC</span></a> , a widely used <a href="https://mas.to/tags/firmware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firmware</span></a> package that allows large fleets of servers to be remotely accessed and managed even when power is unavailable or the operating system isn't functioning.<br><a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/ami" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ami</span></a> <a href="https://mas.to/tags/megarac" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>megarac</span></a></p><p><a href="https://arstechnica.com/security/2025/06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">06/active-exploitation-of-ami-management-tool-imperils-thousands-of-servers/</span></a></p>