Cisco UCS C-Series Servers
Cisco UCS C-Series Servers deliver unified computing in an industry-standard form factor to reduce total cost of ownership and increase agility. Each product addresses varying workload challenges through a balance of processing, memory, I/O, and internal storage resources.
About the Release Notes
This document describes the new features, system requirements, open caveats and known behaviors for C-Series software release 4.3(2) including Cisco Integrated Management Controller (Cisco IMC) software and any related BIOS, firmware, or drivers. Use this document in conjunction with the documents listed in the Related Documentation section.
![]() Note |
We sometimes update the documentation after original publication. Therefore, you should also refer to the documentation on Cisco.com for any updates. |
Revision History
|
Revision |
Date |
Description |
|---|---|---|
|
O0 |
February 23, 2026 |
Created release notes for 4.3(2.260007) for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
|
N0 |
December 18, 2025 |
Created release notes for 4.3(2.250063) for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
|
M0 |
July 31, 2025 |
Created release notes for 4.3(2.250045) for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
|
L0 |
July 7, 2025 |
Created release notes for 4.3(2.250037) for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
|
K1 |
May 30, 2025 |
Updated the Resolved Caveats section in the release notes for 4.3(2.250021). |
|
L0 |
April 14, 2025 |
Created release notes for 4.3(2.250022) for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
|
K0 |
March 18, 2025 |
Created release notes for 4.3(2.250021) for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
|
J1 |
March 11, 2025 |
Updated the Known Behaviors and Limitations section for the release 4.3(2.250016) |
|
J0 |
February 28, 2025 |
Created release notes for 4.3(2.250016) for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
|
I0 |
December 9, 2024 |
Created release notes for 4.3(2.240107) for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
|
H0 |
October 01, 2024 |
Created release notes for 4.3(2.240090) for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
|
G0 |
August 08, 2024 |
Created release notes for 4.3(2.240077) for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
|
F0 |
May 30, 2024 |
Created release notes for 4.3(2.240053) for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
|
E0 |
May 21, 2024 |
Created release notes for 4.3(2.240037) for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
|
D1 |
May 16, 2024 |
Updated the Security Fixes section for the release 4.3(2.240009) |
|
C1 |
May 16, 2024 |
Updated the Security Fixes section for the release 4.3(2.240002) |
|
D0 |
March 05, 2024 |
Created release notes for 4.3(2.240009) for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
|
A1 |
February 22, 2024 |
Updated the Open Caveats section for the release 4.3(2.230207) |
|
C1 |
February 02, 2024 |
Updated the Security Fixes section for the release 4.3(2.240002) |
|
C0 |
January 23, 2024 |
Created release notes for 4.3(2.240002) for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
|
B0 |
November 14, 2023 |
Created release notes for 4.3(2.230270) for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
|
A0 |
August 16, 2023 |
Created release notes for 4.3(2.230207) for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
Cisco IMC Release Number and .ISO Image Names
Beginning with the release 4.3, Cisco is updating the release number naming convention to align with the .ISO images.
Example: 4.3.1.YYXXXX
-
4.3—Represents the main release.
-
.1—Represents the first release.
For the current 4.3 main release, .1 represents the first release number.
For subsequent maintenance releases, this number will represent the related maintenance release number.
-
YY—Represents the year of release.
For the current 4.3 main release, 23 is derived from the year 2023.
-
XXXX—The final 4 digits represent the increasing sequence of build numbers every year.
For the first 4.3 main release, the number is 0097.
Supported Platforms and Release Compatibility Matrix
Supported Platforms in this Release
The following servers are supported in this release:
-
Cisco UCS C220 M7
-
Cisco UCS C240 M7
-
Cisco UCS C220 M6
-
Cisco UCS C240 M6
-
Cisco UCS C245 M6
-
Cisco UCS C225 M6
-
Cisco UCS C220 M5
-
Cisco UCS C240 M5
-
Cisco UCS C240 SD M5
-
Cisco UCS C480 M5
-
Cisco UCS C480 ML M5
-
Cisco UCS C125 M5
-
Cisco UCS S3260 M5
For information about these servers, see Overview of Servers.
Cisco IMC and Cisco UCS Manager Release Compatibility Matrix
Firmware Version Equivalency Between Cisco Intersight, Cisco IMC, and Cisco UCS Manager
For more information, see Cisco UCS Equivalency Matrix for Cisco Intersight, Cisco IMC, and Cisco UCS Manager.
Cisco IMC and Cisco UCS Manager Release Compatibility Matrix
Cisco UCS C-Series Rack-Mount Servers are managed by built-in standalone software —Cisco IMC. However, when a Rack-Mount Server is integrated with Cisco UCS Manager, UCSM end-user interface is used to manage the server.
The following table lists the supported platforms, Cisco IMC releases, and Cisco UCS Manager releases for Rack-Mount Servers:
|
Cisco IMC Release |
Cisco UCS Manager Release |
Rack Mount Servers |
|---|---|---|
|
4.3(2.260007) |
4.3(6f) |
Cisco UCS C220 M5, C240 M5, C480 M5 and C125 M5 servers |
|
4.3(2.250063) |
NA |
Cisco UCS C220 M5, C240 M5, C480 M5 and C125 M5 servers |
|
4.3(2.250045) |
NA |
Cisco UCS C220 M5, C240 M5, C480 M5 and C125 M5 servers |
|
4.3(2.250037) |
4.3(6c) |
Cisco UCS C220 M5, C240 M5, C480 M5 servers |
|
4.3(2.250022) |
NA |
Cisco UCS C125 M5 servers |
|
4.3(2.250021) |
NA |
Cisco UCS C240 M5 servers |
|
4.3(2.250016) |
NA |
Cisco UCS C220 M5, C240 M5, C480 M5, C125 M5 and S3260 M5 servers |
|
4.3(2.240107) |
NA |
Cisco UCS C220 M5, C240 M5, C480 M5, C125 M5 and S3260 M5 servers |
|
4.3(2.240090) |
NA |
Cisco UCS C220 M5, C240 M5, C480 M5, C125 M5 and S3260 M5 servers |
|
4.3(2.240077) |
NA |
Cisco UCS C220 M5, C240 M5, C480 M5, C125 M5 and S3260 M5 servers |
|
4.3(2.240053) |
NA |
Cisco UCS C220 M5, C240 M5, C480 M5, C125 M5 and S3260 M5 servers |
|
4.3(2.240037) |
NA |
|
|
4.3(2.240009) |
NA |
|
|
4.3(2.240002) |
4.3(2) |
|
|
4.3(2.230270) |
4.3(2) |
|
|
4.3(2.230207) |
4.3(2) |
|
|
Cisco IMC Release |
Cisco UCS Manager Release |
Rack Mount Servers |
|---|---|---|
|
4.3(1.230138) |
No Support |
Cisco UCS C220 M7 and C240 M7 servers |
|
4.3(1.230124) |
No Support |
Cisco UCS C220 M7 and C240 M7 servers |
|
4.3(1.230097) |
No Support |
Cisco UCS C220 M7 and C240 M7 servers |
|
Cisco IMC Release |
Cisco UCS Manager Release |
Rack Mount Servers |
|---|---|---|
|
4.2(3p) |
4.2(3o) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C480 M5, S3260 M5, and C125 M5 servers |
|
4.2(3o) |
4.2(3n) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
|
4.2(3n) |
4.2(3m) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
|
4.2(3m) |
4.2(3l) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
|
4.2(3l) |
4.2(3k) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
|
4.2(3k) |
NA |
Cisco UCS S3260 M5 servers |
|
4.2(3j) |
4.2(3j) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
|
4.2(3i) |
4.2(3i) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
|
4.2(3g) |
4.2(3g) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
|
4.2(3e) |
4.2(3e) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
|
4.2(3d) |
4.2(3d) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
|
4.2(3b) |
4.2(3b) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
|
Cisco IMC Release |
Cisco UCS Manager Release |
Rack Mount Servers |
|---|---|---|
|
4.2(2g) |
4.2(2d) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
|
4.2(2f) |
4.2(2c) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
|
4.2(2a) |
4.2(2a) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
|
Cisco IMC Release |
Cisco UCS Manager Release |
Rack Mount Servers |
|---|---|---|
|
4.2(1j) |
4.2(1n) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers |
|
4.2(1i) |
4.2(1m) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers |
|
4.2(1g) |
No Support |
Cisco UCS C225 M6 and C245 M6 servers |
|
4.2(1f) |
4.2(1k) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers |
|
4.2(1e) |
4.2(1i) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers |
|
4.2(1c) |
No Support |
Cisco UCS C225 M6 and C245 M6 servers |
|
4.2(1b) |
4.2(1f) |
Cisco UCS C220 M6 and C240 M6 servers |
|
4.2(1a) |
4.2(1d) |
Cisco UCS C220 M6, C240 M6, and C245 M6 servers |
|
Cisco IMC Release |
Cisco UCS Manager Release |
Rack Mount Servers |
|---|---|---|
| 4.1(3n) |
NA |
Cisco UCS C220 M5, C240 M5, C480 M5, S3260 M5 and S3260 M4 servers |
|
4.1(3m) |
4.1(3m) |
Cisco UCS C220 M5, C240 M5, C480 M5, S3260 M5 and S3260 M4 servers |
|
4.1(3l) |
4.1(3k) |
Cisco UCS C480 M5, C220 M5, C240 M5 servers |
|
4.1(3i) |
4.1(3j) |
Cisco UCS C220 M5, C240 M5, C480 M5, S3260 M4, S3260 M5, C125 M5 servers |
|
4.1(3h) |
4.1(3i) |
Cisco UCS C220 M5, C240 M5, C480 M5, S3260 M4, S3260 M5, C125 M5 servers |
|
4.1(3g) |
No Support |
Cisco UCS S3260 M4 and S3260 M5 servers |
|
4.1(3f) |
4.1(3h) |
Cisco UCS C220 M5, C240 M5, C480 M5, S3260 M4, S3260 M4, S3260 M5, and C125 M5 servers |
|
4.1(3d) |
4.1(3e) |
Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
|
4.1(3c) |
4.1(3d) |
Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5 and C125 M5 servers |
|
4.1(3b) |
4.1(3a) |
Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5 and C125 M5 servers |
|
Cisco IMC Release |
Cisco UCS Manager Release |
Rack Mount Servers |
|---|---|---|
|
4.1(2m) |
No Support |
Cisco UCS C220 M4, C240 M4 and C460 M4 servers. |
|
4.1(2l) |
No Support |
Cisco UCS C220 M4 and C240 M4 servers. |
|
4.1(2k) |
No Support |
Cisco UCS C220 M4, C240 M4, and C460 M4 servers |
|
4.1(2j) |
No Support |
Cisco UCS C220 M4, C240 M4, and C460 M4 servers |
|
4.1(2h) |
No Support |
Cisco UCS C220 M4, C240 M4, and C460 M4 servers |
|
4.1(2g) |
No Support |
Cisco UCS C220 M4, C240 M4, and C460 M4 servers |
|
4.1(2f) |
4.1(2c) |
Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers |
|
4.1(2e) |
No Support |
Cisco UCS C125 M5 servers |
|
4.1(2d) |
No Support |
Cisco UCS C240 M5 and C240 SD M5 servers |
|
4.1(2b) |
4.1(2b) |
Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers |
|
4.1(2a) |
4.1(2a) |
Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers |
|
Cisco IMC Release |
Cisco UCS Manager Release |
Rack Mount Servers |
|---|---|---|
|
4.1(1h) |
4.1(1e) |
Cisco UCS C220 M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers |
|
4.1(1g) |
4.1(1d) |
Cisco UCS C220 M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers |
|
4.1(1f) |
4.1(1c) |
Cisco UCS C220 M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers |
|
4.1(1d) |
4.1(1b) |
Cisco UCS C220 M5, C240 M5, C480 M5, and C480 ML M5 servers |
|
4.1(1c) |
4.1(1a) |
Cisco UCS C220 M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers |
Operating System and Browser Requirements
For detailed information about supported Operating System, see the interactive UCS Hardware and Software Compatibility matrix.
Cisco recommends the following browsers for Cisco UCS Rack Server Software, Release 4.3(2):
|
Recommended Browser |
Minimum Recommended Browser Version |
Minimum Recommended Operating System |
|---|---|---|
| Google Chrome | Version 114.0.5735.198 (Official Build) (x86_64) | Mac OS 13.4.1 (22F82) |
| Version 112.0.5615.138 (Official Build) (64-bit) | Microsoft Windows 2019 | |
| Version 114.0.5735.199 (Official Build) (64-bit) | Microsoft Windows Server 2019 | |
| Version 115.0.5790.110 (Official Build) (64-bit) | Microsoft Windows 11 Enterprise | |
| Version 109.0.5414.149 (Official Build) (64-bit) | Microsoft Windows 2019 | |
| Version 115.0.5790.110 (Official Build) (64-bit) | Microsoft Windows 11 Enterprise | |
| Safari | Version 16.6 (18615.3.12.11.2) | Mac OS 13.5 (22G74) |
| Version 16.5.2 (18615.2.9.11.10) | Mac OS 13.4.1 (22F82) | |
| Mozilla Firefox | 115.0.3 (64-bit) | Mac OS 13.5 (22G74) |
| Microsoft Windows 11 Enterprise | ||
| 116.0 (64-bit) |
![]() Note |
If the management client is launched using an unsupported browser, check the help information from the For best results use supported browsers option available in the login window for the supported browser versions. |
Transport Layer Security (TLS) version 1.2.
Default Ports
Following is a list of server ports and their default port numbers:
|
Port Name |
Port Number |
|---|---|
|
LDAP Port 1 |
389 |
|
LDAP Port 2 |
389 |
|
LDAP Port 3 |
389 |
|
LDAP Port 4 |
3268 |
|
LDAP Port 5 |
3268 |
|
LDAP Port 6 |
3268 |
|
SSH Port |
22 |
|
HTTP Port |
80 |
|
HTTPS Port |
443 |
|
SMTP Port |
25 |
|
KVM Port |
2068 |
|
Intersight Management Port |
8889 |
|
Intersight Cloud Port |
8888 |
|
SOL SSH Port |
2400 |
|
SNMP Port |
161 |
|
SNMP Traps |
162 |
|
External Syslog |
514 |
Upgrade and Downgrade Guidelines
To get a complete overview of all the possible upgrade paths in Cisco IMC, see Cisco UCS Rack Server Upgrade Support Matrix.
Infrastructure Upgrade and Downgrade to Release 4.3(2):
-
Cisco UCS M4 servers are not supported by 4.3(2.230207) and later releases.
-
You must perform firmware update after adding any new hardware component to the system.
-
If you are planning to install Cisco UCS VIC 15237 or 15427 in a server, then upgrade the server to 4.3(2.230270) or later versions and then insert the adapter into the server.
If you insert Cisco UCS VIC 15237 or 15427 into the server that is running earlier versions than 4.3(2.230270), then upgrade the server to 4.3(2.230270) or later versions and power cycle the server to recognize the adapter.
-
If you are planning to install Cisco UCS VIC 15235 or 15425 in a server, then upgrade the server to 4.3(2.230207) or later versions and then insert the adapter into the server.
If you insert Cisco UCS VIC 15235 or 15425 into the server that is running earlier versions than 4.3(2.230207), then upgrade the server to 4.3(2.230207) or later versions and power cycle the server to recognize the adapter.
Support for Cisco UCS M7 Servers
Cisco UCS M7 servers are supported from the release 4.3(1.230097) onwards.
The following releases are for Cisco UCS M7 servers only:
-
4.3(1.230138)
-
4.3(1.230124)
-
4.3(1.230097)
Upgrade Paths to Release 4.3.2
To get a complete overview of all the possible upgrade paths in Cisco IMC, see Cisco UCS Rack Server Upgrade Support Matrix.
Firmware Files
Firmware Files
The C-Series software release 4.3(2.230207) includes the following software files:
| CCO Software Type | File name(s) | Comment |
| Unified Computing System (UCS) Server Firmware |
For release specific ISO versions, see Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
Host Upgrade Utility |
| Unified Computing System (UCS) Drivers | ucs-cxxx-drivers.4.3(2.230207).iso | Drivers |
| Unified Computing System (UCS) Utilities |
ucs-cxxx-utils-efi.4.3(2.230207).iso ucs-cxxx-utils-linux.4.3(2.230207).iso ucs-cxxx-utils-vmware.4.3(2.230207).iso ucs-cxxx-utils-windows.4.3(2.230207).iso |
Utilities |
![]() Note |
Always upgrade the BIOS, the Cisco IMC and CMC from the HUU ISO. Do not upgrade individual components (only BIOS or only Cisco IMC), since this could lead to unexpected behavior. If you choose to upgrade BIOS, and the Cisco IMC individually and not from the HUU ISO, make sure to upgrade both Cisco IMC, and BIOS to the same container release. If the BIOS and the Cisco IMC versions are from different container releases, it could result in unexpected behavior. Cisco recommends that you use the Update All option from the Host Upgrade Utility to update the firmware versions of Cisco IMC, BIOS, and all other server components (VIC, RAID Controllers, PCI devices, and LOM) together. |
Host Upgrade Utility
The Cisco Host Upgrade Utility (HUU) is a tool that upgrades the Cisco UCS C-Series firmware.
The image file for the firmware is embedded in the ISO. The utility displays a menu that allows you to choose which firmware components to upgrade. For more information on this utility, see http://www.cisco.com/en/US/products/ps10493/products_user_guide_list.html.
For details of firmware files in Cisco Host Upgrade Utility for individual releases, see Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3.
Updating the Firmware
Use the Host Upgrade Utility to upgrade the C-Series firmware. Host Upgrade Utility can upgrade the following software components:
-
BIOS
-
Cisco IMC
-
CMC
-
Cisco VIC Adapters
-
Broadcom Adapters
-
LAN on Motherboard
-
PCIe adapter firmware
-
HDD firmware
-
SAS Expander firmware
-
DCPMM Memory
-
PCI Gen5 retimer
All firmware should be upgraded together to ensure proper operation of your server.
![]() Note |
We recommend that you use the select all and Update or Update & Activate All option from the Host Upgrade Utility to update the firmware versions of Cisco IMC, BIOS and all other server components (VIC, RAID Controllers, PCI devices, and LOM) together. Click Exit once you deploy the firmware. |
For more information on how to upgrade the firmware using the utility, see:
SNMP
The supported MIB definition for this release and later releases can be found at the following link:
Software Utilities
The following standard utilities are available:
-
Host Update Utility (HUU)
-
Server Configuration Utility (SCU)
-
Server Diagnostic Utility (SDU)
The utilities features are as follows:
-
Availability of HUU, SCU on the USB as bootable images. The USB also contains driver ISO, and can be accessed from the host operating system.
New Features in Release 4.3
New Hardware Features
-
New Hardware in Release 4.3(2.240077)—None
-
New Hardware in Release 4.3(2.240053)—None
-
New Hardware in Release 4.3(2.240037)—None
-
New Hardware in Release 4.3(2.240009)—None
-
New Hardware in Release 4.3(2.240002)—None
New Software Features
-
New Software in Release 4.3(2.240077)—None
-
New Software in Release 4.3(2.240053)—None
-
New Software in Release 4.3(2.240037)—None
-
New Software in Release 4.3(2.240009)—None
-
New Software in Release 4.3(2.240002)—None
-
New Software in Release 4.3(2.230270)—None
New Hardware in Release 4.3.2
New Hardware in Release 4.3(2.250022)
There are no new hardware in release 4.3(2.250022).
New Hardware in Release 4.3(2.230270)
Cisco UCS VIC Cards
Following Cisco UCS secure boot enabled VIC cards are supported from the release 4.3(2.230270) onwards:
-
Cisco UCS VIC 15427 (UCSC-M-V5Q50GV2) — The Cisco UCS VIC 15427 is a quad-port small-form-factor pluggable (SFP+/SFP28/SFP56) mLOM card designed for Cisco UCS C-series M6/M7 rack servers. The card supports 10/25/50-Gbps Ethernet or FCoE. The card can present PCIe standards-compliant interfaces to the host, and these can be dynamically configured as either NICs or HBAs.
-
Cisco UCS VIC 15237 (UCSC-M-V5D200GV2) — The Cisco UCS VIC 15237 is a dual-port small-form-factor pluggable (QSFP/QSFP28/QSFP56) mLOM card designed for Cisco UCS C-series M6/M7 rack servers. The card supports 40/100/200-Gbps Ethernet or FCoE. The card can present PCIe standards-compliant interfaces to the host, and these can be dynamically configured as either NICs or HBAs.
![]() Note |
|
New Hardware in Release 4.3(2.230207)
Cisco UCS VIC Cards
Following Cisco UCS secure boot enabled VIC cards are supported from the release 4.3(2.230207) onwards:
-
Cisco UCS VIC 15425 (UCSC-P-V5Q50G)—The Cisco UCS VIC 15425 is a quad-port small-form-factor pluggable (SFP+/SFP28/SFP56) PCIe card designed for Cisco UCS C-series M6/M7 rack servers. The card supports 10/25/50-Gbps Ethernet or FCoE. The card can present PCIe standards-compliant interfaces to the host, and these can be dynamically configured as either NICs or HBAs.
-
Cisco UCS VIC 15235 (UCSC-P-V5D200G)—The Cisco UCS VIC 15235 is a dual-port quad small-form-factor pluggable (QSFP/QSFP28/QSFP56) PCIe card designed for Cisco UCS C-series M6/M7 rack servers. The card supports 40/100/200-Gbps Ethernet or FCoE. The card can present PCIe standards-compliant interfaces to the host, and these can be dynamically configured as either NICs or HBAs.
![]() Note |
|
Peripherals
Following peripherals are supported from the release 4.3(2.230207) onwards:
-
Cisco boot optimized M.2 NVMe RAID controller (UCS-M2-NVRAID) - Supported on Cisco UCS C220 M7 and C240 M7 servers
-
Cisco-QLogic QLE2872, 2x64GFC Gen 7 PCIe HBA (UCSC-P-Q7D64GF) - Supported on Cisco UCS C-Series M6 and M7 servers
-
Cisco-NVDA MCX623436AC-CDAB CX6Dx 2x100G QSFP56 x16 OCP NIC (UCSC-O-N6CD100GF) - Supported on Cisco UCS C220 M6 and UCS C240 M6 servers
-
Cisco-NVDA MCX631432AC-ADAB CX6 Lx 2x25G SFP28 x8 OCP NIC (UCSC-O-N6CD25GF) - Supported on Cisco UCS C220 M6 and C240 M6 servers
-
Cisco Tri-Mode 24G SAS RAID Controller w/4GB Cache (UCSC-RAID-HP) - Supported on Cisco UCS C220 M7 and C240 M7 servers
Supported GPUs
The following are the list of new GPUs supported from the release 4.3(2.230207) onwards:
-
Intel Data Center GPU Flex 140, HHHL, 75W PCIe (UCSC-GPU-FLEX140) - Supported on Cisco UCS C220 M7 and UCS C240 M7 servers
-
Intel Data Center GPU Flex 170, FH-3/4L 150W, PCIe (UCSC-GPU-FLEX170) - Supported on Cisco UCS C240 M7 servers.
-
Nvidia H100 350W, 80GB, 2-slot FHFL PCIe GPU (UCSC-GPU-H100-80) - Supported on Cisco UCS C240 M7 servers
-
Nvidia L40, 300W, 48GB, 2-slot FHFL PCIe GPU (UCSC-GPU-L40) - Supported on Cisco UCS C240 M7 servers
-
Nvidia L4, 72W, 24GB, single-slot HHHL PCIe GPU (UCSC-GPU-L4) - Supported on Cisco UCS C220 M7 servers
New Software in Release 4.3.2
New Software Features in Release 4.3(2.250022)
There are no new software features in release 4.3(2.250022).
New Software Features in Release 4.3(2.230207)
The following new software features are supported in Release 4.3(2.230207).
-
Support for Q-in-Q tunneling configuration: A Q-in-Q (802.1Q-in-802.1Q) tunnel allows to segregate the traffic in the infrastructure and helps to expand the VLAN space through the addition of 802.1Q tag to 802.1Q-tagged packets.
-
Support for Secure Boot on Cisco UCS VIC 15235 and 15425 Virtual Interface Cards (VIC) on Cisco UCS C-Series servers.
Secure Boot is a trustworthy technology that ensures the code running on Cisco hardware platforms is authentic, unmodified, and operational as intended. The Secure Boot uses a trust anchor module (TAm) in hardware to verify the bootloader code. It also protects the boot code in hardware and checks digitally signed images to verify that only genuine, unmodified code boots on a Cisco device.
-
Added Windows NENIC Driver support to enable Receive Side Scaling Version 2 (RSSv2) for Cisco UCS VIC 15000 series adapters.
Receive Side Scaling (RSS) supports multiple cores to process the incoming data traffic. When RSS is enabled on the VIC, multiple hardware receive queues can be configured on the Physical Function (PF). In general, a NENIC driver supports 4 queues. With RSSv2, the NENIC driver has no upper limit on the number of hardware queues for PF or VM.
RSSv2 is supported on Cisco UCS C-Series M6 and M7 servers.
-
Support of SRIOV on Cisco UCS VIC 1400 series adapters.
Resolved Caveats in Release 4.3.2
-
Resolved Caveats in Release 4.3(2.240037)—None
Resolved Caveats in Release 4.3(2.260007)
The following defects were resolved in Release 4.3(2.260007):
|
Defect ID |
Symptom |
First Release Affected |
Resolved in Release |
|---|---|---|---|
|
CSCwm03289 |
On Cisco UCS M5, M6, and M7 servers, upgrading Cisco IMC to release version 4.3(2.240009) causes SNMPv3 to stop working for FAN and PSU OIDs. SNMPv2 continues to function correctly. The affected OIDs are under the parent OID .1.3.6.1.4.1.9.9.719.1.15. This issue is resolved. |
4.3(2.240002) |
4.3(2.260007) |
|
CSCwr84583 |
On Cisco UCS M5 and M6 servers running firmware version 4.3(2.240009), TLS session establishment repeatedly fails. This issue occurs when Cisco IMC sends the Change Cipher Spec (CCS) and encrypted handshake messages; the Syslog server often responds with FIN, ACK, and/or RST packets. Server logs typically display GnuTLS errors and indicate forced session closure. This issue is resolved. |
4.3(2.240009) |
4.3(2.260007) |
Resolved Caveats in Release 4.3(2.250063)
The following defects were resolved in Release 4.3(2.250063):
|
Defect ID |
Symptom |
First Release Affected |
Resolved in Release |
|---|---|---|---|
|
CSCwr05546 |
Cisco UCS C240 M5 server experiencd a Blue Screen of Death (BSOD), with the error pointing to the ITSAS35.SYS driver module. This module is associated with the Cisco 12G Modular SAS Host Bus Adapter (HBA). This issue is resolved. |
4.3(2.250016) |
4.3(2.250063) |
|
CSCwq53978 |
After uploading an external certificate using the Cisco IMC CLI, the Security Management tab in the Cisco IMC GUI becomes inaccessible. Attempts to upload the external certificate through the Cisco IMC GUI fail, displaying the following error message: External Certificate upload failed. The certificate upload is successful when performed via the Cisco IMC CLI. Following the CLI upload, the Security Management tab in the GUI no longer loads. The Host Upgrade Utility (HUU) also fails to load. Additionally, there is a failure to contact the LDAP server. This issue is resolved. |
4.1(3f) |
4.3(2.250063) |
|
CSCwi71153 |
In Cisco UCS M5 and M6 servers, BMC reset occurs due to watchdog reset caused by kernel scheduler null pointer dereference. In addition, kernel panic might also occur in the server. This issue is resolved. |
4.2(3b) |
4.3(2.250063) |
Resolved Caveats in Release 4.3(2.250045)
The following defects were resolved in Release 4.3(2.250045):
|
Defect ID |
Symptom |
First Release Affected |
Resolved in Release |
|---|---|---|---|
|
CSCwp05235 |
On Cisco UCS C240 M5 servers running firmware version 4.3(2.250016), Cisco IMC management becomes unavailable during a Cisco IMC reboot caused by an out-of-memory (OOM) condition. Cisco IMC recovers automatically, and the data plane is not affected. This issue is resolved. |
4.3(2.250016) |
4.3(2.250045) |
Resolved Caveats in Release 4.3(2.250037)
The following defects were resolved in Release 4.3(2.250037):
|
Defect ID |
Symptom |
First Release Affected |
Resolved in Release |
|---|---|---|---|
|
CSCwo57529 |
On Cisco UCS C220 M5 servers, SMTP (Simple Mail Transfer Protocol) fails to send alert emails (e.g., for PSU or disk removal) after upgrading the firmware to 4.3(2.240053) or 4.3(2.250021). This issue is not limited to these firmware versions. Test emails work, but no SMTP activity is triggered during alerts. This issue is resolved. |
4.3(2.240053) |
4.3(2.250037) |
|
CSCwo96142 |
Cisco UCS C-series servers are being flagged by vulnerability scanners for using SHA-1 algorithms and deprecated The SHA-1 algorithm and the This issue is resolved. |
4.3(2.250016) 4.3(2.240053) |
4.3(2.250037) |
|
CSCwo99876 |
On Cisco UCS C220 M5 servers, after upgrading to the release version 4.3(2.250016) or later, the BMC_DIE_TEMP sensor crosses the Upper Critical (UC) threshold but does not appear in the CIMC Web UI Sensor list or generate alarms in Cisco IMC. However, the sensor is visible in IPMI and Redfish. This issue occurs during high CPU usage when RackFanControl is not actively cooling the server. Downgrading to 4.3(2.240077) resolves the issue but is not ideal if 4.3(2.250016) includes a required fix. This issue is not limited to these release versions or server model. This issue is resolved. |
4.3(2.250016) 4.3(2.250021) |
4.3(2.250037) |
Resolved Caveats in Release 4.3(2.250022)
There are no resolved caveats in release 4.3(2.250022).
Resolved Caveats in Release 4.3.2.250021
The following defects were resolved in Release 4.3.2.250021:
|
Defect ID |
Symptom |
First Release Affected |
Resolved in Release |
|---|---|---|---|
|
CSCwn97854 |
Server Profile activation fails on Cisco UCS C240 M5 server when upgrading from 4.3(2.240107) to 4.3(2.250016). This issue is resolved. |
4.3(2.250016) |
4.3.2.250021 |
Resolved Caveats in Release 4.3(2.250016)
The following defects were resolved in Release 4.3(2.250016):
|
Defect ID |
Symptom |
First Release Affected |
Resolved in Release |
|---|---|---|---|
|
CSCwf93621 |
In Cisco UCS C240 M5SX and UCS HX240c M5SX servers, when the firmware is upgraded to the release 4.2(3d), discovery or association is failing with a faulty drive in the system. This issue is now resolved. |
4.2(3d) |
4.3(2.250016) |
|
CSCwm45280 |
In Cisco UCS C-series servers, Cisco UCS VIC adapter with low memory in Intersight mode is unable to reply to an adapter inventory
request because the adapter is unable to create a process to handle the request.
This issue is now resolved. |
4.2(3b) |
4.3(2.250016) |
|
CSCwm48655 |
PSU alerts are flapping on Cisco IMC and the the SEL logs are being populated with PSU error messages. This issue is now resolved. |
4.3.2.240107 |
4.3(2.250016) |
|
CSCwn00366 |
Server discovery failures occur on Cisco UCS C-series servers in Intersight Managed Mode when only eNICs or only vHBAs are configured. This issue is caused due to a memory leak in the vniccfgd process, triggered by the palo_vnic_listtype() API call. Over a period of time, the memory leak accumulates, eventually reaching a threshold that leads to failures. This issue is now resolved. |
4.3.2.230207 |
4.3(2.250016) |
|
CSCwn56294 |
In Cisco UCS C220 M5 server, Cisco IMC reboots abruptly and watchdog reset the BMC due to Out of Memory (OOM) error. This issue is resolved. |
4.3.2.240053 |
4.3(2.250016) |
|
CSCwi95393 |
In Cisco UCS M5 servers, random values are displayed for the PID and Serial fields in the Summary tab in Cisco IMC web UI. This issue is resolved. |
4.2(3e) |
4.3(2.250016) |
|
CSCwj68672 |
Cisco UCS 240 M6 servers is stuck during the booting process of hardware platform configuration and the server fails to deploy or activate the profile of the node. |
4.3.2.230207 |
4.3(2.250016) |
|
CSCwm47183 |
Certain HDDs (model MG06SCA800A) unexpectedly show removal marks by the backup application, even though Cisco IMC logs do not indicate any failures. This issue occurs on the Cisco UCS C240 M6 servers with firmware version 4.3(2.240002) equipped with Cisco 12G SAS HBA controller. Disk I/O errors indicate timeouts and read issues, preventing successful mounting and leading to removal marks on the disks. This situation impacts clusters using the backup application, requiring further investigation to prevent disruptions. This issue is resolved. |
4.3.2.240002 |
4.3(2.250016) |
Resolved Caveats in Release 4.3(2.240107)
The following defects were resolved in Release 4.3(2.240107):
|
Defect ID |
Symptom |
First Release Affected |
Resolved in Release |
|---|---|---|---|
|
CSCwm72893 |
Under rare circumstances, the Cisco UCS VIC adapter might hang when the eCPU hangs due to a software issue. This causes temporary storage loss. This issue is now resolved. |
4.2(3i) |
4.3(2.240107) |
|
CSCwm58947 |
In Cisco UCS servers with Microsoft Windows OS and equipped with Cisco UCS VIC adapter configured with VXLAN, NVGRE and RDMA, the adapter goes into hang state and the Windows OS faces a fatal system error(BSOD). This issue is now resolved. |
4.2(3b) |
4.3(2.240107) |
Resolved Caveats in Release 4.3(2.240090)
The following defects were resolved in Release 4.3(2.240090):
|
Defect ID |
Symptom |
First Release Affected |
Resolved in Release |
|---|---|---|---|
|
CSCwm02322 |
In Cisco UCS C220 M5 servers, the XML API commands for fault monitoring does not capture the fan alerts. This issue is now resolved. |
4.1(3f) |
4.3(2.240090) |
|
CSCwj86973 |
In Cisco UCS C220 M5 servers, the SNMP users are not displayed on the This issue is now resolved. |
4.2(2a) |
4.3(2.240090) |
|
CSCwk22654 |
In Cisco UCS C220 M5 servers, the SNMP responses must be improved with better response values for non-populated CPU slots. This issue is now resolved. |
4.3(2.230270) |
4.3(2.240090) |
Resolved Caveats in Release 4.3(2.240077)
The following defects were resolved in Release 4.3(2.240077):
|
Defect ID |
Symptom |
First Release Affected |
Resolved in Release |
|---|---|---|---|
|
CSCwk29026 |
In Cisco UCS M5 servers with the release version 4.3.2.230270 or later, importing Cisco IMC configuration causes LDAP domain and domain groups to not be populated. The fields are not populated in the below mentioned tabs in the Cisco IMC GUI:
This issue is now resolved. |
4.3.2.230270 |
4.3(2.240077) |
Resolved Caveats in 4.3(2.240053)
The following defects were resolved in Release 4.3(2.240053):
|
Defect ID |
Symptom |
First Release Affected |
Resolved in Release |
|---|---|---|---|
|
CSCwj49647 |
While deploying a LAN Connectivity Policy to Cisco UCS C220 and C240 M5 Intersight Managed rack servers, with Cisco IMC release 4.3.2.240002, resulted in following error: Create Virtual Ethernet Interface failed. Error: Configuration Restriction: Internal Server Error. Please report issue with error: XML PARSING ERROR: Element 'adaptorEthSRIOVProfile': This element is not expected.This issue is now resolved. |
4.3.2.240002 |
4.3(2.240053) |
|
CSCwj99346 |
Cisco IMC OOB interfaces does not discover the two SAS HBA Controllers and the corresponding 24 Micron drives. This issue is now resolved. |
4.3.2.240009 |
4.3(2.240053) |
|
CSCwi97945 |
SAS expander firmware updates on Cisco UCS M5 servers through CLI using TFTP and HTTP protocols failed due to an Invalid Password error. The update process through Web GUI is unaffected. This issue is now resolved. |
4.3.2.240002 |
4.3(2.240053) |
Resolved Caveats in Release 4.3(2.240009)
The following defects were resolved in Release 4.3(2.240009):
|
Defect ID |
Symptom |
First Release Affected |
Resolved in Release |
|---|---|---|---|
|
CSCwj00617 |
In Cisco UCS M5 and M6 servers, the SAS expander firmware update from the XML API interface, using HTTP and TFTP protocol, fails and displays the following error message: Operation failed. Invalid Password! This issue is now resolved. |
4.2(3i) |
4.3(2.240009) |
|
CSCwi97945 |
In Cisco UCS M5 and M6 servers, the SAS expander firmware update from the CLI interface, using HTTP and TFTP protocol, fails and displays the following error message: Operation failed. Invalid Password! This issue is now resolved. |
4.2(3i) |
4.3(2.240009) |
Resolved Caveats in Release 4.3(2.240002)
The following defects were resolved in Release 4.3(2.240002):
|
Defect ID |
Symptom |
First Release Affected |
Resolved in Release |
|---|---|---|---|
|
CSCwh45111 |
In Cisco IMC, connectivity is lost when the host is powered off and the system network configuration is set to Cisco card mode and M.2 controller card present in the system. This issue is now resolved. |
4.2(3d) |
4.3(2.240002) |
|
CSCwh53073 |
The date and time is shown incorrectly as in 9 hours in the Alarm page in the Intersight UI. The values for the alarms are generated from Cisco IMC. This issue is now resolved. |
4.3(2.230207) |
4.3(2.240002) |
|
CSCwi04192 |
in Cisco UCS C220 M6 and C240 M6 servers with UCSC-O-N6CD100GF Mellanox card, the third party MLOM cards overheat and flap links as the default fan policy are not sufficient to cool down the card. This issue is now resolved. |
4.3(2.230207) |
4.3(2.240002) |
Resolved Caveats in Release 4.3(2.230270)
The following defects were resolved in Release 4.3(2.230270):
|
Defect ID |
Symptom |
First Release Affected |
Resolved in Release |
|---|---|---|---|
|
CSCwf71163 |
Configuring SRIOV on non default interfaces and rebooting the host might affect the existing SRIOV configuration on default ethernet interfaces. This issue is now resolved. |
4.3(2.230207) |
4.3(2.230270) |
|
CSCwh34432 |
While mounting vMedia using Redfish API, when the user forgets to post the TransferProtocolType field, the following error message is displayed:
This issue is now resolved. |
4.3(1.230097) |
4.3(2.230270) |
|
CSCwf44478 |
In Cisco UCS C-series M7 servers with Red Hat Enterprise Linux OS versions 8.6 and 9.0, Micron 7450 NVMe drive does not get detected after hot-plug. This issue is now resolved. |
4.3(2.230207) |
4.3(2.230270) |
|
CSCwh13701 |
When Cisco UCS C225 M6 and C245 M6 servers, equipped with Liteon PSUs and have firmware versions prior to 4.2(3h), the servers will power off with no warning. This issue is now resolved. |
4.3(1.230097) |
4.3(2.230270) |
|
CSCwh14449 |
When Cisco IMC is reset to factory default on Cisco UCS C220 M7 and C240 M7 server, the default admin password cannot be set using Redfish interface. This issue is now resolved. |
4.3(2.230207) |
4.3(2.230270) |
|
CSCwf94278 |
In Cisco UCS C-series M5 servers with Cisco IMC release versions 4.1(3b), 4.2(2a), 4.2(3b), the user can create a session with a 'read only' user, but unable to delete or log out from the session while using the Redfish API interface. This issue is now resolved. |
4.2(2a) |
4.3(2.230207) |
|
CSCwh06536 |
The links with SFP-10G-T-X are up on VIC 14xx series adapters from the VIC firmware version 5.2(2b). However, the links with SFP-10G-T-X on VIC 14xx series adapters are down after upgrading the VIC firmware version to 5.3.2.32 from the version 5.2(2b). This issue is now resolved. |
4.2(3b) |
4.3(2.230270) |
|
CSCwb82433 |
Cisco UCS C220 M5 servers, equipped with Cisco UCS VIC 1400 series adapter and have Geneve feature enabled, go offline after the Cisco UCS VIC adapters fail to respond. This issue is now resolved. |
4.2(1d) |
4.3(2.230270) |
Resolved Caveats in Release 4.3(2.230207)
The following defects were resolved in Release 4.3(2.230207):
|
Defect ID |
Symptom |
First Release Affected |
Resolved in Release |
|---|---|---|---|
|
CSCwf18625 |
Few UCS-HD1T7K12N and UCS-HD2T7K12N running firmware version CN05 may experience timeouts and go offline. This issue is now resolved. |
4.1(3j) |
4.3(2.230207) |
|
CSCwe92151 |
In Cisco UCS 240 M6 and M7 servers, the host automatically changes from power OFF to ON state when some hard disk drives are inserted or initialized while performing any operation. This causes low level firmware update failure. This issue is now resolved. |
4.2(1a) |
4.3(2.230207) |
|
CSCwf27804 |
Incorrect values observed for the OID .1.3.6.1.4.1.9.9.719.1.45.8.1.14 for RAID 10, RAID 50 and RAID 60 configuration. This issue is now resolved. |
4.2(2a) |
4.3(2.230207) |
|
CSCwe28875 |
When there is one or more Intel E810 card installed on the server during upgrade, HUU might report firmware update failure for any Intel NIC adapters in the system. This issue is now resolved. |
4.3(1.230097) |
4.3(2.230207) |
|
CSCwd90347 |
On hot removal or insertion of NVMe drive, the Redfish PCI inventory does not get updated. The same inventory is updated in other Cisco IMC interfaces (GUI or CLI). This issue is now resolved. |
4.2(3b) |
4.2(3d) |
|
CSCvq53066 |
During auto-upgrade of firmware from Cisco UCS Manager 4.0(2d) or earlier releases to Cisco UCS Manager 4.0(4b) or later releases, the SAS controller firmware is not activated on an integrated rack server. This issue is resolved. |
4.0(4a) |
4.1(1d) |
|
CSCvt78954 |
Windows 2019 server OS installation fails on Cisco UCS C125 servers equipped with Cisco boot optimized m.2 RAID controller. This issue is resolved. |
4.1(1e) |
4.2(1d) |
|
CSCvv08931 |
On the Cisco UCS S3260 Storage Server, the Chassis profile association failed due to configuration issues such as This issue is resolved. |
4.0(4h) |
4.2(1d) |
|
CSCvy51599 |
In Cisco UCS C-Series M5 servers running Cisco IMC version 4.1(3b) or later, SNMP services restart frequently when snmpbulkget with higher Cr value is triggered against Cisco IMC. This issue is now resolved. |
4.1(3c |
4.1(3d) |
|
CSCwb45042 |
In a setup equipped with Cisco UCS M6 server and Cisco VIC 15xxx card in MLOM slot, an error log event in Cisco IMC SEL is recorded with the following message: |
4.2(2a) |
4.2(3b) |
|
CSCwd90347 |
On hot removal or insertion of NVMe drive, the Redfish PCI inventory does not get updated. The sameinventory is updated in other Cisco IMC interfaces (GUI or CLI). This issue is now resolved. |
4.2(3b) |
4.2(3d) |
|
CSCwe44891 |
The Delete all vNICs option in the Web UI deletes 6 vNICs only. This issue is now resolved. |
4.3.1.230097 |
4.3.1.230124 |
|
CSCwe48853 |
After performing data sanitization, the USB devices connected to the rear USB ports do not work. This issue is now resolved. |
4.3.1.230097 |
4.3.1.230124 |
|
CSCwe87764 |
In Cisco UCS M7 servers equipped with 128GB DIMMs, there might be a decrease in the performance of the CPU when the values of the voltage regulator is modified to enhance the system performance. This issue is now resolved. |
4.3.1.230138 |
4.3.1.230138 |
|
CSCwf52657 |
In Cisco UCS C240 M7 servers equipped with GPU and the BIOS parameter Enhanced CPU performance set to auto, the voltage regulator settings are retained. This issue is now resolved. |
4.3.1.230138 |
4.3(2.230207) |
Open Caveats in Release 4.3.2
-
Open Caveats in Release 4.3(2.240053)—None
-
Open Caveats in Release 4.3(2.240037)—None
-
Open Caveats in Release 4.3(2.240009)—None
-
Open Caveats in Release 4.3(2.230270)—None
Open Caveats in Release 4.3(2.250022)
There are no open caveats in release 4.3(2.250022).
Open Caveats in Release 4.3(2.240090)
The following defect is open in Release 4.3(2.240090):
|
Defect ID |
Symptom |
Workaround |
First Affected Release |
|---|---|---|---|
|
CSCwm55124 |
Due to the Broadcom/VMware data center migration, any new Cisco UCS M5 server certifications can be initiated only after 14th October 2024. VMware certifications and equivalencies will need to be started again with a new session in VIVa 2.0. The new session is planned to be launched on 14th October 2024. |
There is no workaround. |
4.3(2.240090) |
Open Caveats in Release 4.3(2.240002)
The following defect is open in Release 4.3(2.240002):
|
Defect ID |
Symptom |
Workaround |
First Affected Release |
|---|---|---|---|
|
CSCwi40270 |
In a Cisco UCS C240 M7 server set with Riser 1 Slot 1 populated with Intel, Mellanox or any other non Cisco cards and Cisco UCS VIC adapter is populated in Riser 1 Slot 2, the Cisco UCS VIC adapter might not get IP after Cisco IMC reset factory default. |
|
4.3(2.240002) |
Open Caveats in Release 4.3(2.230207)
The following defects are open in Release 4.3(2.230207):
|
Defect ID |
Symptom |
Workaround |
First Affected Release |
|---|---|---|---|
|
CSCwj06157 |
In Cisco UCS M7 servers equipped with the next generation Cisco Boot optimized M.2 Raid controller, the system fan is ramping up and down. |
Ignore the fan noise as it has no impact on functionality. OR Perform the following steps to set the Fan Control Policy to High Power:
|
4.3(2.230207) |
|
CSCwc27609 |
When the server is equipped with one or more Intel® E810 25G/100G Ethernet adapters attached to PCIe Gen5 riser, and the server is under continuous reboot, the Intel E810 25G or 100G adapter might not initialize on the PCIe bus. |
Perform a DC power cycle to the servers. This re-initializes the adapter's PCIe interface. |
4.3(1.230097) |
|
CSCwb55301 |
When VMD is enabled on Cisco UCS C240 M7 server equipped with 20 or more NVMe drives, the server might exhibit longer boot time (POST). This could be 1-2 minutes longer than in a server when VMD is disabled. |
There are no known workarounds. |
4.3(1.230097) |
|
CSCvy26147 |
In a Cisco UCS C240 M6 server with dual UCSC-SAS-M6T card configured in legacy boot mode, drives in MRAID1 are not listed in Legacy OPROM dispatch after the link is disabled. |
After replacing the adapters, ensure that the host is powered off and on. Reboot only with both the controller inserted. |
4.2(1a) |
|
CSCwb87912 |
When KMIP Client private key with size higher than 12 KB is used in Web UI, modify controller security operation times out in Web UI. |
Use the private key size of 8 KB and refresh the Web UI after 2 minutes. |
4.2(2a) |
|
CSCwh14449 |
After Cisco IMC is reset to factory default on Cisco UCS C220 M7 and C240 M7 servers, the default admin password can not be set using Redfish API interface. |
Use other Cisco IMC interfaces like Web UI, CLI, XML API and Cisco IMC configuration utility (F8) to set the admin password. |
4.3(1.230097) |
|
CSCwf71163 |
When SRIOV is configured on non default ethernet interfaces and the host is rebooted, SRIOV configuration is not available on default interfaces. Configuring SRIOV on non default interfaces and rebooting the host might affect the existing SRIOV configuration on default ethernet interfaces. |
Use SRIOV on only default interfaces. |
4.3(2.230207) |
|
CSCwf44478 |
In Cisco UCS M7 C-series equipped with RHEL OS versions 8.6 and 9.0, Micron 7450 NVMe drive does not get detected after hot-plug. |
|
4.3(2.230207) |
|
CSCwf53294 |
In Cisco UCS M7 C-series with Cisco UCS release version 4.3(2.230207), unable to boot to RHEL 8.7 when VMD is enabled in the BIOS. the system boots to a blank screen or the system boot halts with an error message. |
For a clean deployment, install RHEL 8.8. For existing RHEL 8.7 installations, perform the following steps:
For new RHEL 8.7 installation with 4.3(2.230207), perform the following steps:
|
4.3(2.230207) |
Known Behaviors and Limitations in Release 4.3.2
-
Known Behaviors and Limitations in Release 4.3.2.250021—None
-
Known Behaviors and Limitations in Release 4.3(2.240053)—None
-
Known Behaviors and Limitations in Release 4.3(2.240037)—None
-
Known Behaviors and Limitations in Release 4.3(2.240009)—None
-
Known Behaviors and Limitations in Release 4.3(2.240002)—None
-
Known Behaviors and Limitations in Release 4.3(2.230270)—None
Known Behaviors and Limitations in Release 4.3.2.250016
Known Behaviors and Limitations
The following caveats are known limitations in release 4.3.2.250016:
|
Defect ID |
Symptom |
Workaround |
First Affected Release |
|---|---|---|---|
|
CSCwn97854 |
Server Profile activation on a Cisco UCS C240 M5 server fails when upgrading from 4.3(2.240107) to 4.3(2.250016). |
Scenario 1: Using Firmware Policy If server discovery is successful, follow these steps:
Scenario 2: Using Direct Upgrade Downgrade or upgrade to a stable BIOS version to recover the server. For assistance with recovering the server, contact Cisco TAC. |
4.3(2.250016) |
Known Behaviors and Limitations in Release 4.3(2.230207)
The following caveats are known limitations in release 4.3(2.230207):
|
Defect ID |
Symptom |
Workaround |
First Affected Release |
|---|---|---|---|
|
CSCwf88782 |
When VIC firmware FPGA changes after firmware upgrade, VIC details might not be displayed in Cisco IMC. |
Reboot the server as FPGA requires additional power cycle for the firmware to be updated. |
4.3(2.230207) |
|
CSCwc59562 |
In Cisco IMC Web UI, CPU and Memory utilization percentage numbers might not match with the Operating System Utilization numbers. |
There are no known workarounds. |
4.3(1.230097) |
|
CSCvy26147 |
In a Cisco UCS C240 M6 server with dual UCSC-SAS-M6T card configured in legacy boot mode, drives in MRAID1 are not listed in Legacy OPROM dispatch after the link is disabled. |
After replacing the adapters, ensure that the host is powered off and on. Reboot only with both the controller inserted. |
4.2(1a) |
|
CSCvy89810 |
In Cisco UCS C245 M6 servers, if NIC Mode is configured as Shared OCP Extended, then BMC becomes inaccessible after downgrading to release 4.2(1a). |
Perform the following steps to recover the Cisco IMC network:
|
4.2(1c) |
|
CSCwc64817 |
In Cisco UCS S3260 M5 servers running Cisco IMC release 4.1(3g): Redfish API user interface does not populate the drive list under SimpleStorage resource. |
Use the resources under Storage resource. The resources under SimpleStorage resource are deprecated. |
4.1(3g) |
Security Fixes in Release 4.3.2
Security Fixes in Release 4.3(2.250037)
Defect ID - CSCwo49702
Cisco UCS M5 servers are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2024-45332—Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure through local access.
Security Fixes in Release 4.3(2.250016)
Defect ID - CSCwm73565
Cisco UCS M5 servers are affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2024-28047—Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
Security Fixes in Release 4.3(2.240090)
Defect ID - CSCwk77757
Cisco UCS M5 servers are affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2024-24853—Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege through local access.
-
CVE-2024-21781—Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to enable information disclosure or denial of service through local access.
Defect ID - CSCwi21160
Cisco IMC includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2019-1543—ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce input for every encryption operation. RFC 7539 specifies that the nonce value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce length and front pads the nonce with 0 bytes if it is less than 12 bytes. However it also incorrectly allows a nonce to be set of up to 16 bytes. In this case only the last 12 bytes are significant and any additional leading bytes are ignored. It is a requirement of using this cipher that nonce values are unique. Messages encrypted using a reused nonce value are susceptible to serious confidentiality and integrity attacks. If an application changes the default nonce length to be longer than 12 bytes and then makes a change to the leading bytes of the nonce expecting the new value to be a new unique nonce then such an application could inadvertently encrypt messages with a reused nonce. Additionally the ignored bytes in a long nonce are not covered by the integrity guarantee of this cipher. Any application that relies on the integrity of these ignored leading bytes of a long nonce may be further affected. Any OpenSSL internal use of this cipher, including in SSL/TLS, is safe because no such use sets such a long nonce value. However user applications that use this cipher directly and set a non-default nonce length to be longer than 12 bytes may be vulnerable. OpenSSL versions 1.1.1 and 1.1.0 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1c (Affected 1.1.1-1.1.1b). Fixed in OpenSSL 1.1.0k (Affected 1.1.0-1.1.0j).
-
CVE-2019-1547—Normally in OpenSSL EC groups always have a co-factor present and this is used in side channel resistant code paths. However, in some cases, it is possible to construct a group using explicit parameters (instead of using a named curve). In those cases it is possible that such a group does not have the cofactor present. This can occur even where all the parameters match a known named curve. If such a curve is used then OpenSSL falls back to non-side channel resistant code paths which may result in full key recovery during an ECDSA signature operation. In order to be vulnerable an attacker would have to have the ability to time the creation of a large number of signatures where explicit parameters with no co-factor present are in use by an application using libcrypto. For the avoidance of doubt libssl is not vulnerable because explicit parameters are never used. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
-
CVE-2019-1552—OpenSSL has internal defaults for a directory tree where it can find a configuration file as well as certificates used for verification in TLS. This directory is most commonly referred to as OPENSSLDIR, and is configurable with the -\-prefix / -\-openssldir configuration options. For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets assume that resulting programs and libraries are installed in a Unix-like environment and the default prefix for program installation as well as for OPENSSLDIR should be '/usr/local'. However, mingw programs are Windows programs, and as such, find themselves looking at sub-directories of 'C:/usr/local', which may be world writable, which enables untrusted users to modify OpenSSL's default configuration, insert CA certificates, modify (or even replace) existing engine modules, etc. For OpenSSL 1.0.2, '/usr/local/ssl' is used as default for OPENSSLDIR on all Unix and Windows targets, including Visual C builds. However, some build instructions for the diverse Windows targets on 1.0.2 encourage you to specify your own -\-prefix. OpenSSL versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue. Due to the limited scope of affected deployments this has been assessed as low severity and therefore we are not creating new releases at this time. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
-
CVE-2019-1563—In situations where an attacker receives automated notification of the success or failure of a decryption attempt an attacker, after sending a very large number of messages to be decrypted, can recover a CMS/PKCS7 transported encryption key or decrypt any RSA encrypted message that was encrypted with the public RSA key, using a Bleichenbacher padding oracle attack. Applications are not affected if they use a certificate together with the private RSA key to the CMS_decrypt or PKCS7_decrypt functions to select the correct recipient info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
-
CVE-2020-1968—The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).
-
CVE-2021-23840—Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
-
CVE-2021-3711—In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).
-
CVE-2021-3712—ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).
-
CVE-2022-0778—The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
CSCwi21161
Cisco IMC includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2010-4252—OpenSSL before 1.0.0c, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote attackers to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values in each round of the protocol.
-
CVE-2010-5298—Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
-
CVE-2011-1945—The elliptic curve cryptography (ECC) subsystem in OpenSSL 1.0.0d and earlier, when the Elliptic Curve Digital Signature Algorithm (ECDSA) is used for the ECDHE_ECDSA cipher suite, does not properly implement curves over binary fields, which makes it easier for context-dependent attackers to determine private keys via a timing attack and a lattice calculation.
-
CVE-2011-4108—The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.
-
CVE-2011-4576—The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.
-
CVE-2011-4577—OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is enabled, allows remote attackers to cause a denial of service (assertion failure) via an X.509 certificate containing certificate-extension data associated with (1) IP address blocks or (2) Autonomous System (AS) identifiers.
-
CVE-2011-4619—The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
-
CVE-2012-0027—The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.
CVE-2013-6449—The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.
-
CVE-2014-0076—The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
-
CVE-2014-3566—The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
-
CVE-2014-3567—Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
-
CVE-2014-3568—OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.
-
CVE-2014-3570—The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.
-
CVE-2014-3571—OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
-
CVE-2014-3572—The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.
-
CVE-2014-8275—OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.
-
CVE-2015-0204—The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue. NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
-
CVE-2015-0209—Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.
-
CVE-2015-0286—The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.
-
CVE-2015-0287—The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.
-
CVE-2015-0288—The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.
-
CVE-2015-0289—The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.
-
CVE-2015-0293—The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.
-
CVE-2015-1788—The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.
-
CVE-2015-1789—The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.
-
CVE-2015-1790—The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.
-
CVE-2015-1791—Rare condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.
-
CVE-2015-1792—The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.
-
CVE-2015-3195—The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.
-
CVE-2015-4000—The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
-
CVE-2016-0703—The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
-
CVE-2016-0704—An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
-
CVE-2016-2106—Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.
-
CVE-2016-2107—The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
-
CVE-2016-2108—The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.
-
CVE-2016-2109—The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.
-
CVE-2016-2176—The X509_NAME_oneline function in crypto/x509/x509_obj.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to obtain sensitive information from process stack memory or cause a denial of service (buffer over-read) via crafted EBCDIC ASN.1 data.
-
CVE-2016-7056—A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.
-
CVE-2017-3735—While parsing an IPAddressFamily extension in an X.509 certificate, it is possible to do a one-byte overread. This would result in an incorrect text display of the certificate. This bug has been present since 2006 and is present in all versions of OpenSSL before 1.0.2m and 1.1.0g.
-
CVE-2021-23840—Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x).
-
CVE-2021-3711—In order to decrypt SM2 encrypted data an application is expected to call the API function EVP_PKEY_decrypt(). Typically an application will call this function twice. The first time, on entry, the "out" parameter can be NULL and, on exit, the "outlen" parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call EVP_PKEY_decrypt() again, but this time passing a non-NULL value for the "out" parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to EVP_PKEY_decrypt() can be smaller than the actual size required by the second call. This can lead to a buffer overflow when EVP_PKEY_decrypt() is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of 62 bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated. Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k).
-
CVE-2021-3712—ASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the "data" and "length" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the "data" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).
-
CVE-2021-4044—Internally libssl in OpenSSL calls X509_verify_cert() on the client side to verify a certificate supplied by a server. That function may return a negative return value to indicate an internal error (for example out of memory). Such a negative return value is mishandled by OpenSSL and will cause an IO function (such as SSL_connect() or SSL_do_handshake()) to not indicate success and a subsequent call to SSL_get_error() to return the value SSL_ERROR_WANT_RETRY_VERIFY. This return value is only supposed to be returned by OpenSSL if the application has previously called SSL_CTX_set_cert_verify_callback(). Since most applications do not do this the SSL_ERROR_WANT_RETRY_VERIFY return value from SSL_get_error() will be totally unexpected and applications may not behave correctly as a result. The exact behaviour will depend on the application but it could result in crashes, infinite loops or other similar incorrect responses. This issue is made more serious in combination with a separate bug in OpenSSL 3.0 that will cause X509_verify_cert() to indicate an internal error when processing a certificate chain. This will occur where a certificate does not include the Subject Alternative Name extension but where a Certificate Authority has enforced name constraints. This issue can occur even with valid chains. By combining the two issues an attacker could induce incorrect, application dependent behaviour. Fixed in OpenSSL 3.0.1 (Affected 3.0.0).
Security Fixes in Release 4.3(2.240077)
Defect ID - CSCwk62266
Cisco IMC includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2024-6387—A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.
Security Fixes in Release 4.3(2.240053)
Defect ID - CSCwi59840
Cisco IMC includes Third-party Software that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2023-48795—The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks, such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, also known as Terrapin attack.
This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and use of sequence numbers. For example, when there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC), the bypass occurs in chacha20-poly1305@openssh.com, (and if CBC is used, then the -etm@openssh.com MAC algorithms).
Security Fixes in Release 4.3(2.240037)
Defect ID - CSCwi59840
Cisco UCS M5 servers are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2023-48795—The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks, such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, also known as Terrapin attack.
This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and use of sequence numbers. For example, when there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC), the bypass occurs in chacha20-poly1305@openssh.com, (and if CBC is used, then the -etm@openssh.com MAC algorithms).
Security Fixes in Release 4.3(2.240009)
Defect ID - CSCwi43005
Cisco UCS C-Series M5 and M6 Rack Servers are affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID(s):
-
CVE-2024-20356— A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root.
This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root.
Defect ID - CSCwj41082
Cisco UCS S-Series S3260 Rack Servers are affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID(s):
-
CVE-2024-20356— A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root.
This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root.
Defect ID - CSCwh68315
Cisco UCS M6 servers are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2023-23583—Sequence of processor instructions leads to unexpected behavior in some Intel(R) processors and may allow an authenticated user to potentially enable escalation of privilege and information disclosure and denial of service through local access.
Defect ID - CSCwh23927
Cisco UCS C225 M6 and C245 M6 servers with AMD CPUs are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID:
-
CVE-2023-20569—A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.
Defect ID - CSCwh43415
Cisco UCS C225 M6 and C245 M6 servers with AMD CPUs are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2021-26345—Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.
-
CVE-2022-23830—SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.
-
CVE-2021-46774—Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.
-
CVE-2023-20519—A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.
-
CVE-2023-20566—Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.
Security Fixes in Release 4.3(2.240002)
Defect ID - CSCwi10842
Cisco UCS C-Series M5, M6 and M7 Rack Servers are affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID(s):
-
CVE-2024-20295— A vulnerability in the Cisco IMC CLI could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have read-only or higher privileges on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker to elevate privileges to root.
Defect ID - CSCwh68315
Cisco UCS M6 servers are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2023-23583—Sequence of processor instructions leads to unexpected behavior in some Intel(R) processors and may allow an authenticated user to potentially enable escalation of privilege and information disclosure and denial of service through local access.
Defect ID - CSCwh23927
Cisco UCS C225 M6 and C245 M6 servers with AMD CPUs are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID:
-
CVE-2023-20569—A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.
Defect ID - CSCwh43415
Cisco UCS C225 M6 and C245 M6 servers with AMD CPUs are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2021-26345—Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.
-
CVE-2022-23830—SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.
-
CVE-2021-46774—Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.
-
CVE-2023-20519—A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.
-
CVE-2023-20566—Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.
Security Fixes in Release 4.3(2.230270)
Defect ID - CSCwh17053
Cisco UCS C225 and C245 M6 servers are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2023-20593—An issue in Zen 2 CPUs, under specific microarchitectural circumstances, might allow an attacker to potentially access sensitive information.
Defect ID - CSCwh18140
Cisco UCS C125 M5 servers are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2023-20593—An issue in Zen 2 CPUs, under specific microarchitectural circumstances, might allow an attacker to potentially access sensitive information.
Security Fixes in Release 4.3(2.230207)
Defect ID - CSCwe96259
Cisco UCS C-series servers are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2023-20228—A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the browser of the targeted user or access sensitive, browser-based information.
Defect ID - CSCwf29777
Cisco UCS C-series servers are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2019-11358—jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
-
CVE-2015-9251—jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
Defect ID - CSCwf30460
Cisco UCS M6 C-series servers are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2022-41804—Unauthorized error injection in Intel(R) SGX or Intel(R) TDX for some Intel(R) Xeon(R) Processors which may allow a privileged user to potentially enable escalation of privilege through local access.
-
CVE-2022-40982—Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure through local access.
-
CVE-2023-23908—Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure through local access.
-
CVE-2022-37343— Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege through local access.
Defect ID - CSCwf30468
Cisco UCS M5 C-series servers are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2022-40982—Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure through local access.
-
CVE-2022-43505—Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service through local access.
Related Documentation
For configuration information for this release, refer to the following:
-
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide
-
Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide
-
Cisco UCS Rack-Mount Servers Cisco IMC API Programmer's Guide
For information about installation of the C-Series servers, refer to the following:
The following related documentation is available for the Cisco Unified Computing System:
-
For information about supported firmware versions and supported UCS Manager versions for the rack servers that are integrated with the UCS Manager for management, refer to Release Bundle Contents for Cisco UCS Software.
Refer to the release notes for Cisco UCS Manager software and the Cisco UCS C Series Server Integration with Cisco UCS Manager Guide at the following locations:

Feedback