The vulnerabilities were found in firmware made by AMI for BMCs (baseboard management controllers), by researchers Eclypsium.
These vulnerabilities, which can be exploited by local or remote attackers with access to Redfish remote management interfaces, could lead to unauthorized access, remote code execution, and potential physical damage to servers.
Until the vulnerabilities are patched using an update AMI published on Thursday, they provide a means for malicious hackers -- both financially motivated or nation-state sponsored -- to gain superuser status inside some of the most sensitive cloud environments in the world.
From there, the attackers could install ransomware and espionage malware that runs at some of the lowest levels inside infected machines. Successful attackers could also cause physical damage to servers or indefinite reboot loops that a victim organization can't interrupt.
Eclypsium warned such events could lead to "lights out forever" scenarios.
The researchers went on to note that if they could locate the vulnerabilities and write exploits after analysing the publicly available source code, there's nothing stopping malicious actors from doing the same. And even without access to the source code, the vulnerabilities could still be identified by decompiling BMC firmware images.
There are no indication that malicious parties have done so, but there's no way to know they haven't. The researchers privately notified AMI of the vulnerabilities.