Source: Ministry of education information & communication security contingency platform
Publication Number | TACERT-ANA-2025060609060707 | Publication Time | 2025/06/06 09:03 |
Incident Type | ANA-Vulnerability Alert | Discovery Time | 2025/06/06 09:03 |
Impact Level | Low | ||
[Subject] [Vulnerability Alert] Privilege Escalation Vulnerability in Cisco Integrated Management Controller (CVE-2025-20261) |
|||
[Content] Forwarded from TWCERTCC-200-202506-00000002 Cisco Integrated Management Controller (IMC) is a management tool designed specifically for Cisco Unified Computing System (UCS) servers, enabling remote monitoring, configuration, and administration. A recently disclosed critical security vulnerability (CVE-2025-20261, CVSS: 8.8) affects the SSH connection handling in IMC. This flaw allows authenticated remote attackers to escalate their privileges and gain access to internal services. Information Sharing Level: WHITE (Information content can be publicly disclosed) |
|||
[Affected Platform] UCS B-Series Blade Servers UCS C-Series Rack Servers UCS S-Series Storage Servers UCS X-Series Modular System |
|||
[Recommended Actions] Please refer to Cisco’s official advisory for updates: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-ssh-priv-esc-2mZDtdjM |
|||
[Reference] https://www.twcert.org.tw/tw/cp-169-10165-f0f9c-1.html |