Jump to the main content block

[Vulnerability Alert] Privilege Escalation Vulnerability in Cisco Integrated Management Controller (CVE-2025-20261)

publish date : 2025-06-10 update date : 2025-06-10

Source: Ministry of education information & communication security contingency platform

Publication Number TACERT-ANA-2025060609060707 Publication Time 2025/06/06 09:03
Incident Type ANA-Vulnerability Alert Discovery Time 2025/06/06 09:03
Impact Level Low  
[Subject]
[Vulnerability Alert] Privilege Escalation Vulnerability in Cisco Integrated Management Controller (CVE-2025-20261)
[Content]
Forwarded from TWCERTCC-200-202506-00000002

Cisco Integrated Management Controller (IMC) is a management tool designed specifically for Cisco Unified Computing System (UCS) servers, enabling remote monitoring, configuration, and administration. A recently disclosed critical security vulnerability (CVE-2025-20261, CVSS: 8.8) affects the SSH connection handling in IMC. This flaw allows authenticated remote attackers to escalate their privileges and gain access to internal services.

Information Sharing Level: WHITE (Information content can be publicly disclosed)
[Affected Platform]
UCS B-Series Blade Servers
UCS C-Series Rack Servers
UCS S-Series Storage Servers
UCS X-Series Modular System
[Recommended Actions]
Please refer to Cisco’s official advisory for updates:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ucs-ssh-priv-esc-2mZDtdjM
[Reference]
https://www.twcert.org.tw/tw/cp-169-10165-f0f9c-1.html
(This notification is for informational purposes only and does not constitute a cybersecurity incident).
If you have questions or suggestions regarding this notification, please feel free to contact us.
Ministry of education information & communication security contingency platform
Website: https://info.cert.tanet.edu.tw/
Phone: +886-7-5250211
Internet Phone: 98400000
E-Mail: service@cert.tanet.edu.tw
Organizer: Computer Center
Click Num: