Cisco UCS C-Series Servers
Cisco UCS C-Series Servers deliver unified computing in an industry-standard form factor to reduce total cost of ownership and increase agility. Each product addresses varying workload challenges through a balance of processing, memory, I/O, and internal storage resources.
About the Release Notes
This document describes the new features, system requirements, open caveats and known behaviors for C-Series software release 4.3(2) including Cisco Integrated Management Controller (Cisco IMC) software and any related BIOS, firmware, or drivers. Use this document in conjunction with the documents listed in the Related Documentation section.
![]() Note |
We sometimes update the documentation after original publication. Therefore, you should also refer to the documentation on Cisco.com for any updates. |
Revision History
Revision |
Date |
Description |
---|---|---|
B1 |
May 21, 2024 |
Updated the section Security Fixes for the release 4.3.3.240041 |
A2 |
May 21, 2024 |
Updated the section Security Fixes for the release 4.3.3.240022 |
C0 |
April 23, 2024 |
Created release notes for 4.3.3.240043 for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
B0 |
April 16, 2024 |
Created release notes for 4.3.3.240041 for the following servers:
This patch contains fixes and firmware updates for Cisco UCS S3260 M5 server. |
A1 |
March 21, 2024 |
Added new section Security Fixes for the release 4.3.3.240022 |
A0 |
February 15, 2024 |
Created release notes for 4.3.3.240022 for the following servers:
The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
Cisco IMC Release Number and .ISO Image Names
Beginning with the release 4.3, Cisco is updating the release number naming convention to align with the .ISO images.
Example: 4.3.1.YYXXXX
-
4.3—Represents the main release.
-
.1—Represents the first release.
For the current 4.3 main release, .1 represents the first release number.
For subsequent maintenance releases, this number will represent the related maintenance release number.
-
YY—Represents the year of release.
For the current 4.3 main release, 23 is derived from the year 2023.
-
XXXX—The final 4 digits represent the increasing sequence of build numbers every year.
For the first 4.3 main release, the number is 0097.
Supported Platforms and Release Compatibility Matrix
Supported Platforms in this Release
The following servers are supported in this release:
-
Cisco UCS C220 M7
-
Cisco UCS C240 M7
-
Cisco UCS C220 M6
-
Cisco UCS C240 M6
-
Cisco UCS C245 M6
-
Cisco UCS C225 M6
-
Cisco UCS S3260 M5
For information about these servers, see Overview of Servers.
Cisco IMC and Cisco UCS Manager Release Compatibility Matrix
Cisco UCS C-Series Rack-Mount Servers are managed by built-in standalone software —Cisco IMC. However, when a Rack-Mount Server is integrated with Cisco UCS Manager, UCSM end-user interface is used to manage the server.
The following table lists the supported platforms, Cisco IMC releases, and Cisco UCS Manager releases for Rack-Mount Servers:
Cisco IMC Release |
Cisco UCS Manager Release |
Rack Mount Servers |
---|---|---|
4.3.3.240043 |
NA |
|
4.3.3.240041 |
NA |
|
4.3.3.240022 |
4.3(3a) |
|
Cisco IMC Release |
Cisco UCS Manager Release |
Rack Mount Servers |
---|---|---|
4.3.2.240037 |
NA |
|
4.3.2.240009 |
NA |
|
4.3.2.240002 |
4.3(2) |
|
4.3.2.230270 |
4.3(2) |
|
4.3.2.230207 |
4.3(2) |
|
Cisco IMC Release |
Cisco UCS Manager Release |
Rack Mount Servers |
---|---|---|
4.3.1.230138 |
No Support |
Cisco UCS C220 M7 and C240 M7 servers |
4.3.1.230124 |
No Support |
Cisco UCS C220 M7 and C240 M7 servers |
4.3.1.230097 |
No Support |
Cisco UCS C220 M7 and C240 M7 servers |
Cisco IMC Release |
Cisco UCS Manager Release |
Rack Mount Servers |
---|---|---|
4.2(3k) |
NA |
Cisco UCS S3260 M5 servers |
4.2(3j) |
4.2(3j) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
4.2(3i) |
4.2(3i) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
4.2(3g) |
4.2(3g) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
4.2(3e) |
4.2(3e) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
4.2(3d) |
4.2(3d) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
4.2(3b) |
4.2(3b) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
Cisco IMC Release |
Cisco UCS Manager Release |
Rack Mount Servers |
---|---|---|
4.2(2g) |
4.2(2d) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
4.2(2f) |
4.2(2c) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
4.2(2a) |
4.2(2a) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
Cisco IMC Release |
Cisco UCS Manager Release |
Rack Mount Servers |
---|---|---|
4.2(1j) |
4.2(1n) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers |
4.2(1i) |
4.2(1m) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers |
4.2(1g) |
No Support |
Cisco UCS C225 M6 and C245 M6 servers |
4.2(1f) |
4.2(1k) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers |
4.2(1e) |
4.2(1i) |
Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers |
4.2(1c) |
No Support |
Cisco UCS C225 M6 and C245 M6 servers |
4.2(1b) |
4.2(1f) |
Cisco UCS C220 M6 and C240 M6 servers |
4.2(1a) |
4.2(1d) |
Cisco UCS C220 M6, C240 M6, and C245 M6 servers |
Cisco IMC Release |
Cisco UCS Manager Release |
Rack Mount Servers |
---|---|---|
4.1(3n) |
NA |
Cisco UCS C220 M5, C240 M5, C480 M5, S3260 M5 and S3260 M4 servers |
4.1(3m) |
4.1(3m) |
Cisco UCS C220 M5, C240 M5, C480 M5, S3260 M5 and S3260 M4 servers |
4.1(3l) |
4.1(3k) |
Cisco UCS C480 M5, C220 M5, C240 M5 servers |
4.1(3i) |
4.1(3j) |
Cisco UCS C220 M5, C240 M5, C480 M5, S3260 M4, S3260 M5, C125 M5 servers |
4.1(3h) |
4.1(3i) |
Cisco UCS C220 M5, C240 M5, C480 M5, S3260 M4, S3260 M5, C125 M5 servers |
4.1(3g) |
No Support |
Cisco UCS S3260 M4 and S3260 M5 servers |
4.1(3f) |
4.1(3h) |
Cisco UCS C220 M5, C240 M5, C480 M5, S3260 M4, S3260 M4, S3260 M5, and C125 M5 servers |
4.1(3d) |
4.1(3e) |
Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers |
4.1(3c) |
4.1(3d) |
Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5 and C125 M5 servers |
4.1(3b) |
4.1(3a) |
Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5 and C125 M5 servers |
Cisco IMC Release |
Cisco UCS Manager Release |
Rack Mount Servers |
---|---|---|
4.1(2m) |
No Support |
Cisco UCS C220 M4, C240 M4 and C460 M4 servers. |
4.1(2l) |
No Support |
Cisco UCS C220 M4 and C240 M4 servers. |
4.1(2k) |
No Support |
Cisco UCS C220 M4, C240 M4, and C460 M4 servers |
4.1(2j) |
No Support |
Cisco UCS C220 M4, C240 M4, and C460 M4 servers |
4.1(2h) |
No Support |
Cisco UCS C220 M4, C240 M4, and C460 M4 servers |
4.1(2g) |
No Support |
Cisco UCS C220 M4, C240 M4, and C460 M4 servers |
4.1(2f) |
4.1(2c) |
Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers |
4.1(2e) |
No Support |
Cisco UCS C125 M5 servers |
4.1(2d) |
No Support |
Cisco UCS C240 M5 and C240 SD M5 servers |
4.1(2b) |
4.1(2b) |
Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers |
4.1(2a) |
4.1(2a) |
Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers |
Cisco IMC Release |
Cisco UCS Manager Release |
Rack Mount Servers |
---|---|---|
4.1(1h) |
4.1(1e) |
Cisco UCS C220 M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers |
4.1(1g) |
4.1(1d) |
Cisco UCS C220 M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers |
4.1(1f) |
4.1(1c) |
Cisco UCS C220 M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers |
4.1(1d) |
4.1(1b) |
Cisco UCS C220 M5, C240 M5, C480 M5, and C480 ML M5 servers |
4.1(1c) |
4.1(1a) |
Cisco UCS C220 M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers |
Operating System and Browser Requirements
For detailed information about supported Operating System, see the interactive UCS Hardware and Software Compatibility matrix.
Cisco recommends the following browsers for Cisco UCS Rack Server Software, Release 4.3(3):
Recommended Browser |
Minimum Recommended Browser Version |
Minimum Recommended Operating System |
---|---|---|
Google Chrome | Version 114.0.5735.198 (Official Build) (x86_64) | Mac OS 13.4.1 (22F82) |
Version 112.0.5615.138 (Official Build) (64-bit) | Microsoft Windows 2019 | |
Version 114.0.5735.199 (Official Build) (64-bit) | Microsoft Windows Server 2019 | |
Version 115.0.5790.110 (Official Build) (64-bit) | Microsoft Windows 11 Enterprise | |
Version 109.0.5414.149 (Official Build) (64-bit) | Microsoft Windows 2019 | |
Version 115.0.5790.110 (Official Build) (64-bit) | Microsoft Windows 11 Enterprise | |
Safari | Version 16.6 (18615.3.12.11.2) | Mac OS 13.5 (22G74) |
Version 16.5.2 (18615.2.9.11.10) | Mac OS 13.4.1 (22F82) | |
Mozilla Firefox | 115.0.3 (64-bit) | Mac OS 13.5 (22G74) |
Microsoft Windows 11 Enterprise | ||
116.0 (64-bit) |
![]() Note |
If the management client is launched using an unsupported browser, check the help information from the For best results use supported browsers option available in the login window for the supported browser versions. |
Transport Layer Security (TLS) version 1.2.
Default Ports
Following is a list of server ports and their default port numbers:
Port Name |
Port Number |
---|---|
LDAP Port 1 |
389 |
LDAP Port 2 |
389 |
LDAP Port 3 |
389 |
LDAP Port 4 |
3268 |
LDAP Port 5 |
3268 |
LDAP Port 6 |
3268 |
SSH Port |
22 |
HTTP Port |
80 |
HTTPS Port |
443 |
SMTP Port |
25 |
KVM Port |
2068 |
Intersight Management Port |
8889 |
Intersight Cloud Port |
8888 |
SOL SSH Port |
2400 |
SNMP Port |
161 |
SNMP Traps |
162 |
External Syslog |
514 |
Upgrade and Downgrade Guidelines
To get a complete overview of all the possible upgrade paths in Cisco IMC, see Cisco UCS Rack Server Upgrade Support Matrix.
Downgrade Limitation for Release 4.3.3.240022:
In the release 4.3.3.240022, you cannot downgrade the Cisco UCS M7 servers with 5th Gen Intel® Xeon® processors.
When you try to downgrade Cisco IMC, the following error message is displayed on CLI, GUI, Redfish API and XML API user interfaces:
Error message during BMC downgrade with different interfaces like CLI/WEBUI/Redfish/XML =
“Update aborted. INCOMPATIBLE_IMAGE”
When you try to downgrade BIOS, the following error message is displayed on CLI, GUI, Redfish API and XML API user interfaces:
CPU ID mismatch between uploaded image and the platform.
![]() Note |
You can downgrade Cisco UCS M7 servers with 4th Generation Intel® Xeon® Scalable Processors. |
Infrastructure Upgrade and Downgrade to Release 4.3(2):
-
Cisco UCS M4 servers are not supported by 4.3.2.230207 and later releases.
-
You must perform firmware update after adding any new hardware component to the system.
-
If you are planning to install Cisco UCS VIC 15237 or 15427 in a server, then upgrade the server to 4.3.2.230270 or later versions and then insert the adapter into the server.
If you insert Cisco UCS VIC 15237 or 15427 into the server that is running earlier versions than 4.3.2.230270, then upgrade the server to 4.3.2.230270 or later versions and power cycle the server to recognize the adapter.
-
If you are planning to install Cisco UCS VIC 15235 or 15425 in a server, then upgrade the server to 4.3.2.230207 or later versions and then insert the adapter into the server.
If you insert Cisco UCS VIC 15235 or 15425 into the server that is running earlier versions than 4.3.2.230207, then upgrade the server to 4.3.2.230207 or later versions and power cycle the server to recognize the adapter.
Support for Cisco UCS M7 Servers
Cisco UCS M7 servers are supported from the release 4.3.1.230097 onwards.
The following releases are for Cisco UCS M7 servers only:
-
4.3.1.230138
-
4.3.1.230124
-
4.3.1.230097
Upgrade Paths to Release 4.3.3
The section provides information on the upgrade paths to release 4.3.3.
Refer to the table for upgrade paths for various Cisco UCS C-series IMC versions.
Upgrade From Release |
Upgrade To Release |
Recommended Upgrade Path |
||
---|---|---|---|---|
Following Cisco UCS servers from the release 4.3.1.230097
|
|
Follow below upgrade path:
|
||
Following Cisco UCS servers from the release 4.2(3b)
|
|
Follow below upgrade path:
|
||
Following Cisco UCS servers from the release 4.2(2)
|
|
Follow below upgrade path:
|
||
All Cisco UCS M6 Servers from 4.2(1). For the list of supported platforms, see Table 2. |
|
Follow below upgrade path:
|
||
Following Cisco UCS Servers from 4.1(3):
|
|
Follow below upgrade path:
|
||
Following Cisco UCS Servers from 4.1(2):
|
|
Follow below upgrade path:
|
||
Following Cisco UCS Servers from 4.1(1):
|
|
Follow below upgrade path:
|
||
Following Cisco UCS Servers from 4.0(4):
|
|
Follow below upgrade path:
|
Upgrade From Release |
Upgrade To Release |
Recommended Upgrade Path |
---|---|---|
Cisco UCS C220 M6 |
|
Follow below upgrade path:
|
Cisco UCS C240 M6 |
||
Cisco UCS C225 M6 |
||
Cisco UCS C245 M6 |
Firmware Files
Firmware Files
The C-Series software release 4.3.3.240022 includes the following software files:
CCO Software Type | File name(s) | Comment |
Unified Computing System (UCS) Server Firmware |
For release specific ISO versions, see Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3 |
Host Upgrade Utility |
Unified Computing System (UCS) Drivers | ucs-cxxx-drivers.4.3.3.240022.iso | Drivers |
Unified Computing System (UCS) Utilities |
ucs-cxxx-utils-efi.4.3.3.240022.iso ucs-cxxx-utils-linux.4.3.3.240022.iso ucs-cxxx-utils-vmware.4.3.3.240022.iso ucs-cxxx-utils-windows.4.3.3.240022.iso |
Utilities |
![]() Note |
Always upgrade the BIOS, the Cisco IMC and CMC from the HUU ISO. Do not upgrade individual components (only BIOS or only Cisco IMC), since this could lead to unexpected behavior. If you choose to upgrade BIOS, and the Cisco IMC individually and not from the HUU ISO, make sure to upgrade both Cisco IMC, and BIOS to the same container release. If the BIOS and the Cisco IMC versions are from different container releases, it could result in unexpected behavior. Cisco recommends that you use the Update All option from the Host Upgrade Utility to update the firmware versions of Cisco IMC, BIOS, and all other server components (VIC, RAID Controllers, PCI devices, and LOM) together. |
Host Upgrade Utility
The Cisco Host Upgrade Utility (HUU) is a tool that upgrades the Cisco UCS C-Series firmware.
The image file for the firmware is embedded in the ISO. The utility displays a menu that allows you to choose which firmware components to upgrade. For more information on this utility, see http://www.cisco.com/en/US/products/ps10493/products_user_guide_list.html.
For details of firmware files in Cisco Host Upgrade Utility for individual releases, see Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3.
Updating the Firmware
Use the Host Upgrade Utility to upgrade the C-Series firmware. Host Upgrade Utility can upgrade the following software components:
-
BIOS
-
Cisco IMC
-
CMC
-
Cisco VIC Adapters
-
Broadcom Adapters
-
LAN on Motherboard
-
PCIe adapter firmware
-
HDD firmware
-
SAS Expander firmware
-
DCPMM Memory
-
PCI Gen5 retimer
All firmware should be upgraded together to ensure proper operation of your server.
![]() Note |
We recommend that you use the select all and Update or Update & Activate All option from the Host Upgrade Utility to update the firmware versions of Cisco IMC, BIOS and all other server components (VIC, RAID Controllers, PCI devices, and LOM) together. Click Exit once you deploy the firmware. |
For more information on how to upgrade the firmware using the utility, see:
SNMP
The supported MIB definition for this release and later releases can be found at the following link:
Software Utilities
The following standard utilities are available:
-
Host Update Utility (HUU)
-
Server Configuration Utility (SCU)
-
Server Diagnostic Utility (SDU)
The utilities features are as follows:
-
Availability of HUU, SCU on the USB as bootable images. The USB also contains driver ISO, and can be accessed from the host operating system.
New Hardware in Release 4.3.3
New Hardware in Release 4.3.3.240022
Support for 5th Gen Intel® Xeon® Scalable Processors
Support for the following 5th Gen Intel® Xeon® Scalable Processors with Cisco UCS 220 M7 and UCS C240 M7 servers:
-
Intel® Xeon® Platinum 8592V Processor
-
Intel® Xeon® Platinum 8562Y+ Processor
-
Intel® Xeon® Platinum 8568Y+ Processor
-
Intel® Xeon® Platinum 8592+ Processor
-
Intel® Xeon® Platinum 8558P Processor
-
Intel® Xeon® Platinum 8580 Processor
-
Intel® Xeon® Platinum 8558 Processor
-
Intel® Xeon® Gold 6542Y Processor
-
Intel® Xeon® Gold 6544Y Processor
-
Intel® Xeon® Gold 6548Y+ Processor
-
Intel® Xeon® Gold 6526Y Processor
-
Intel® Xeon® Gold 6530 Processor
-
Intel® Xeon® Gold 6534 Processor
-
Intel® Xeon® Gold 6554S Processor
-
Intel® Xeon® Gold 6538Y+ Processor
-
Intel® Xeon® Gold 5515+ Processor
-
Intel® Xeon® Gold 5520+ Processor
-
Intel® Xeon® Gold 6548N Processor
-
Intel® Xeon® Silver 4514Y Processor
-
Intel® Xeon® Silver 4516Y+ Processor
Supported GPUs
Support for the following Intel GPU cards with the CPUs listed in the above section:
-
Intel® Data Center GPU Flex 170, FH-3/4L, 150W PCIe with Cisco UCS C240 M7 servers
-
Intel® Data Center GPU Flex 140, HHHL, 75W PCIe with Cisco UCS C220 M7 and C240 M7 servers
Support for 5600 DIMMs
Support for the following 5600 DIMMs:
-
Hynix 16GB 1Rx8 PC5-5600B-RD0-1010-XT (HMCG78AGBRA190N BB 307)
-
Hynix 32GB 1Rx4 PC5-5600B-RC0-1010-XT (HMCG84AGBRA190N BB 310)
-
Hynix 64GB 2Rx4 PC5-5600B-RA0-1010-XT (HMCG94AGBRA177N BB 327)
-
Hynix 96GB 96GB 2Rx4 PC5-5600B-RA0-1010-XT (HMCGM4MGBRB)
-
Hynix 128GB 2S2Rx4 PC5-5600B-RA0-1010-XT (HMCT04AGERA)
-
Samsung 16GB 1Rx8 PC5-5600B-RD0-1010-XT (KR M321R2GA3PB0-CWMKH 2323)
-
Samsung 32GB 1Rx4 PC5-5600B-RC0-1010-XT (M321R4GA0PB0-CWM)
-
Samsung 64GB 2Rx4 PC5-5600B-RA0-1010-XT (KR M321R8GA0PB0-CWMCH 2326)
-
Micron 96GB 2RX4 PC5-5600B-RA0-1010-XT (MTC40F204WS1RC56BB1 317)
Resolved Caveats
Resolved Caveats in Release 4.3.3.240043
The following defects were resolved in Release 4.3.3.240043:
Defect ID |
Symptom |
First Release Affected |
Resolved in Release |
---|---|---|---|
CSCwj00617 |
In Cisco UCS M5 and M6 servers, the SAS expander firmware update from the XML API interface, using HTTP and TFTP protocol, fails and displays the following error message: Operation failed. Invalid Password! This issue is now resolved. |
4.2(3i) |
4.3.3.240043 |
Open Caveats
Open Caveats in Release 4.3.3.240022
The following defects are open in Release 4.3.3.240022:
Defect ID |
Symptom |
Workaround |
First Affected Release |
---|---|---|---|
CSCwi85031 |
In a Cisco UCS C240 M7 server equipped with 2 Intel Flex 170 GPUs placed on two Riser slots and dual socket server with CPU SKUs (with built-in single QAT, DLB, DSA, IAA accelerator devices) and running on Cisco UCS HUU 4.3.3 with RHEL 9.2 and Ubuntu 22.04.3, kernel panic and boot hang is observed. By default, BIOS uses a lower MMIO base and size. This causes an issue with the GPUs during PCI enumeration as Intel Flex 170 GPUs require higher range memory with more granularity size. |
Perform the following steps:
|
4.3.3.240022 |
CSCwi85033 |
In a Cisco UCS C240 M7 server equipped with 2 Nvidia H100 GPUs placed on two Riser slots and dual socket server with CPU SKUs (with built-in single QAT, DLB, DSA, IAA accelerator devices) and running on Cisco UCS HUU 4.3.3 with RHEL 9.2 and Ubuntu 22.04.3, kernel panic and boot hang is observed. By default, BIOS uses a lower MMIO base and size. This causes an issue with the GPUs during PCI enumeration as Nvidia H100 GPUs require higher range memory with more granularity size. |
Perform the following steps:
|
4.3.3.240022 |
Security Fixes
Security Fixes in Release 4.3.3.240041
Defect ID - CSCwj41082
Cisco UCS S-Series S3260 Rack Servers are affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID(s):
-
CVE-2024-20356— A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root.
This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root.
Security Fixes in Release 4.3.3.240022
Defect ID - CSCwi43005
Cisco UCS C-Series M6 and M7 Rack Servers are affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) ID(s):
-
CVE-2024-20356— A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with Administrator-level privileges to perform command injection attacks on an affected system and elevate their privileges to root.
This vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by sending crafted commands to the web-based management interface of the affected software. A successful exploit could allow the attacker to elevate their privileges to root.
Defect ID - CSCwi47887
Cisco UCS M7 servers are affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:
-
CVE-2023-22655—Protection mechanism failure in some 3rd and 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
-
CVE-2023-32666—On-chip debug and test interface with improper access control in some 4th Generation Intel(R) Xeon(R) Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.
-
CVE-2023-39368—Protection mechanism failure of bus lock regulator for some Intel(R) Processors may allow an unauthenticated user to potentially enable denial of service via network access.
-
CVE-2023-38575—Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Related Documentation
For configuration information for this release, refer to the following:
-
Cisco UCS C-Series Servers Integrated Management Controller CLI Configuration Guide
-
Cisco UCS C-Series Servers Integrated Management Controller GUI Configuration Guide
-
Cisco UCS Rack-Mount Servers Cisco IMC API Programmer's Guide
For information about installation of the C-Series servers, refer to the following:
The following related documentation is available for the Cisco Unified Computing System:
-
For information about supported firmware versions and supported UCS Manager versions for the rack servers that are integrated with the UCS Manager for management, refer to Release Bundle Contents for Cisco UCS Software.
Refer to the release notes for Cisco UCS Manager software and the Cisco UCS C Series Server Integration with Cisco UCS Manager Guide at the following locations: