{"version":"1.0","provider_name":"AMI","provider_url":"https:\/\/www.ami.com","title":"Response to MegaRAC Baseboard Management Controller Vulnerabilities","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"SjfK4lHWSW\"><a href=\"https:\/\/www.ami.com\/resource\/response-to-megarac-baseboard-management-controller-vulnerabilities\/\">Response to MegaRAC Baseboard Management Controller Vulnerabilities<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ami.com\/resource\/response-to-megarac-baseboard-management-controller-vulnerabilities\/embed\/#?secret=SjfK4lHWSW\" width=\"600\" height=\"338\" title=\"&#8220;Response to MegaRAC Baseboard Management Controller Vulnerabilities&#8221; &#8212; AMI\" data-secret=\"SjfK4lHWSW\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.ami.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"At AMI, we take vulnerabilities seriously and continuously monitor and respond to the changing security landscape. When these MegaRAC Baseboard Management Controller vulnerabilities were identified, our Product Security Incident Response Team (PSIRT) swung into action, allowing AMI to address the vulnerabilities effectively and efficiently. In collaboration with CISA, CERT, and Eclypsium, we worked on the [&hellip;]"}