web analytics

Cisco UCS Manager Software Command Injection Vulnerabilities – Source:sec.cloudapps.cisco.com

Rate this post

Source: sec.cloudapps.cisco.com – Author: .

Cisco UCS Manager Software Command Injection Vulnerabilities

Medium

CVE-2025-20294

CVE-2025-20295

CWE-78

Summary

Affected Products

  • At the time of publication, these vulnerabilities affected the following Cisco products if they were running Cisco UCS Manager Software, regardless of device configuration:

    • UCS 6300 Series Fabric Interconnects
    • UCS 6400 Series Fabric Interconnects
    • UCS 6500 Series Fabric Interconnects
    • UCS X-Series Direct Fabric Interconnect 9108 100G

    For information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.

    Only products listed in the Vulnerable Products section of this advisory are known to be affected by these vulnerabilities.

    Cisco has confirmed that these vulnerabilities do not affect the following Cisco products:

    • Firepower 1000 Series
    • Firepower 2100 Series
    • Firepower 4100 Series
    • Firepower 9300 Security Appliances
    • MDS 9000 Series Multilayer Switches
    • Nexus 1000 Virtual Edge for VMware vSphere
    • Nexus 3000 Series Switches
    • Nexus 5500 Platform Switches
    • Nexus 5600 Platform Switches
    • Nexus 6000 Series Switches
    • Nexus 7000 Series Switches
    • Nexus 9000 Series Fabric Switches in ACI mode
    • Nexus 9000 Series Switches in standalone NX-OS mode
    • Secure Firewall 3100 Series
    • Secure Firewall 4200 Series

Details

  • The vulnerabilities are not dependent on one another. Exploitation of one of the vulnerabilities is not required to exploit another vulnerability. In addition, a software release that is affected by one of the vulnerabilities may not be affected by the other vulnerabilities.

    Details about the vulnerabilities are as follows:

    CVE-2025-20294: Cisco UCS Manager Software Command Injection Vulnerabilities

    Multiple vulnerabilities in the CLI and web-based management interface of Cisco UCS Manager Software could allow an authenticated, remote attacker with administrative privileges to perform command injection attacks on an affected system and elevate privileges to root.

    These vulnerabilities are due to insufficient input validation of command arguments supplied by the user. An attacker could exploit these vulnerabilities by authenticating to a device and submitting crafted input to the affected commands. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system of the affected device with root-level privileges.

    Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.

    Bug ID(s): CSCwn06825
    CVE ID: CVE-2025-20294
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 6.5
    CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

    CVE-2025-20295: Cisco UCS Manager Software Command Injection Vulnerability

    A vulnerability in the CLI of Cisco UCS Manager Software could allow an authenticated, local attacker with administrative privileges to read or create a file or overwrite any file on the file system of the underlying operating system of an affected device, including system files.

    This vulnerability is due to insufficient input validation of command arguments supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to read or create a file or overwrite any file on the file system of the underlying operating system of the affected device, including system files. To exploit this vulnerability, the attacker must have valid administrative credentials on the affected device.

    Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

    Bug ID(s): CSCwm88176
    CVE ID: CVE-2025-20295
    Security Impact Rating (SIR): Medium
    CVSS Base Score: 6
    CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

Workarounds

  • There are no workarounds that address these vulnerabilities.

Fixed Software

  • When considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page, to determine exposure and a complete upgrade solution.

    In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.

    Cisco UCS Software

    At the time of publication, the release information in the following table was accurate. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information.

    The left column lists Cisco software releases, and the right column indicates whether a release was affected by the vulnerabilities described in this advisory and which release included the fix for these vulnerabilities.

    UCS 6300 Series, 6400 Series, 6500 Series, and 9108 100G Fabric Interconnects

    Cisco UCS Software Release First Fixed Release
    4.1 and earlier Migrate to a fixed release.
    4.2 4.2(3p)
    4.3 4.3(6c)
    6.0 Not vulnerable.

    To determine the best release for Cisco UCS Software, see the Recommended Releases documents in the release notes for the device.

    The Cisco Product Security Incident Response Team (PSIRT) validates only the affected and fixed release information that is documented in this advisory.

Exploitation and Public Announcements

  • The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.

Source

  • These vulnerabilities were found during internal security testing.

Cisco Security Vulnerability Policy

  • To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.

Related to This Advisory

URL

Revision History

  • Version Description Section Status Date
    1.0 Initial public release. Final 2025-AUG-27

    Show Less

Original Post url: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-multi-cmdinj-E4Ukjyrz?vs_f=Cisco%20Security%20Advisory%26vs_cat=Security%20Intelligence%26vs_type=RSS%26vs_p=Cisco%20UCS%20Manager%20Software%20Command%20Injection%20Vulnerabilities%26vs_k=1

Category & Tags: –

Views: 3

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post