Cisco UCS C-Series Servers

Cisco UCS C-Series Servers deliver unified computing in an industry-standard form factor to reduce total cost of ownership and increase agility. Each product addresses varying workload challenges through a balance of processing, memory, I/O, and internal storage resources.

About the Release Notes

This document describes the new features, system requirements, open caveats and known behaviors for C-Series software release 4.3(6) including Cisco Integrated Management Controller (Cisco IMC) software and any related BIOS, firmware, or drivers. Use this document in conjunction with the documents listed in the Related Documentation section.


Note


We sometimes update the documentation after original publication. Therefore, you should also refer to the documentation on Cisco.com for any updates.


Revision History

Revision

Date

Description

G1

March 05, 2026

Added CSCwt41941 in the Open Caveats section in the release 4.3(6.260003).

H0

February 23, 2026

Created release notes for 4.3(6.260017) for the following servers:

  • Cisco UCS C220 M8, C225 M8, C240 M8 and C245 M8 servers

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 servers

  • Cisco UCS S3260 M5 servers

The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3

G0

January 14, 2026

Created release notes for 4.3(6.260003) for the following servers:

  • Cisco UCS C220 M8 and C240 M8 servers

  • Cisco UCS C220 M7 and C240 M7 servers

The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3

C1

December 10, 2025

Added CSCws30219 in the Open Caveats section in the release 4.3(6.250053).

F0

November 13, 2025

Created release notes for 4.3(6.250117) for the following servers:

  • Cisco UCS C220 M7 servers

The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3

E0

October 28, 2025

Created release notes for 4.3(6.250101) for the following servers:

  • Cisco UCS C220 M8, C225 M8, C240 M8 and C245 M8 servers

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 servers

  • Cisco UCS S3260 M5 servers

The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3

D0

August 25, 2025

Created release notes for 4.3(6.250060) for the following servers:

  • Cisco UCS C245 M8 servers

The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3

C0

July 7, 2025

Created release notes for 4.3(6.250053) for the following servers:

  • Cisco UCS C220 M8, C225 M8, C240 M8 and C245 M8 servers

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 servers

  • Cisco UCS S3260 M5 servers

The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3

B0

May 22, 2025

Created release notes for 4.3(6.250044) for the following servers:

  • Cisco UCS C220 M8, C225 M8, C240 M8 and C245 M8 servers

  • Cisco UCS C220 M7 and C240 M7 servers

The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3

A0

April 30, 2025

Created release notes for 4.3(6.250039) for the following servers:

  • Cisco UCS C220 M8, C240 M8 servers

  • Cisco UCS S3260 M5 servers

The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3

Created release notes for 4.3(6.250040) for the following servers:

  • Cisco UCS C225 M8 and C245 M8 servers

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 servers

The firmware files in Cisco Host Upgrade Utility for individual releases are available at: Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3

Cisco IMC Release Number and .ISO Image Names

Beginning with the release 4.3, Cisco is updating the release number naming convention to align with the .ISO images.

Example: 4.3.1.YYXXXX

  • 4.3—Represents the main release.

  • .1—Represents the first release.

    For the current 4.3 main release, .1 represents the first release number.

    For subsequent maintenance releases, this number will represent the related maintenance release number.

  • YY—Represents the year of release.

    For the current 4.3 main release, 23 is derived from the year 2023.

  • XXXX—The final 4 digits represent the increasing sequence of build numbers every year.

    For the first 4.3 main release, the number is 0097.

Supported Platforms and Release Compatibility Matrix

Supported Platforms in this Release

The following servers are supported in this release:

  • Cisco UCS C220 M8

  • Cisco UCS C240 M8

  • Cisco UCS C225 M8

  • Cisco UCS C245 M8

  • Cisco UCS C220 M7

  • Cisco UCS C240 M7

  • Cisco UCS C220 M6

  • Cisco UCS C240 M6

  • Cisco UCS C225 M6

  • Cisco UCS C245 M6

  • Cisco UCS S3260 M5

For information about these servers, see Overview of Servers.

Cisco IMC and Cisco UCS Manager Release Compatibility Matrix

Firmware Version Equivalency Between Cisco Intersight, Cisco IMC, and Cisco UCS Manager

For more information, see Cisco UCS Equivalency Matrix for Cisco Intersight, Cisco IMC, and Cisco UCS Manager.

Cisco IMC and Cisco UCS Manager Release Compatibility Matrix

Cisco UCS C-Series Rack-Mount Servers are managed by built-in standalone software —Cisco IMC. However, when a Rack-Mount Server is integrated with Cisco UCS Manager, UCSM end-user interface is used to manage the server.

The following table lists the supported platforms, Cisco IMC releases, and Cisco UCS Manager releases for Rack-Mount Servers:

Table 1. Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 4.3(6) Release

Cisco IMC Release

Cisco UCS Manager Release

Rack Mount Servers

4.3(6.260017)

4.3(6f)

  • Cisco UCS C220 M8, C225 M8, C240 M8 and C245 M8 servers

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 servers

  • Cisco UCS S3260 M5 servers

4.3(6.260003)

4.3(6e)

  • Cisco UCS C220 M8 and C240 M8 servers

  • Cisco UCS C220 M7 and C240 M7 servers

4.3(6.250117)

NA

  • Cisco UCS C220 M7 servers

4.3(6.250101)

4.3(6d)

  • Cisco UCS C220 M8, C225 M8, C240 M8 and C245 M8 servers

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 servers

  • Cisco UCS S3260 M5 servers

4.3(6.250060)

NA

  • Cisco UCS C245 M8 servers

4.3(6.250053)

4.3(6c)

  • Cisco UCS C220 M8, C225 M8, C240 M8 and C245 M8 servers

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 servers

  • Cisco UCS S3260 M5 servers

4.3(6.250044)

4.3(6b)

  • Cisco UCS C220 M8, C225 M8, C240 M8 and C245 M8 servers

  • Cisco UCS C220 M7 and C240 M7 servers

4.3(6.250039)

4.3(6a)

  • Cisco UCS C220 M8 and C240 M8 servers

  • Cisco UCS S3260 M5 servers

4.3(6.250040)

  • Cisco UCS C225 M8 and C245 M8 servers

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 servers

Table 2. Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 4.3(5) Release

Cisco IMC Release

Cisco UCS Manager Release

Rack Mount Servers

4.3(5.250045)

NA

  • Cisco UCS C225 M8 servers

4.3(5.250043)

NA

  • Cisco UCS C225 M8 and C245 M8 servers

4.3(5.250033)

NA

  • Cisco UCS C225 M8 and C245 M8 servers

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6, C245 M6 servers and S3260 M5 servers

4.3(5.250030)

4.3(5d)

  • Cisco UCS C225 M8 and C245 M8 servers

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6, C245 M6 servers and S3260 M5 servers

4.3(5.250001)

4.3(5c)

  • Cisco UCS C225 M8 and C245 M8 servers

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6, C245 M6 servers and S3260 M5 servers

4.3(5.240021)​

4.3(5a)

  • Cisco UCS C225 M8 and C245 M8 servers

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6, C245 M6 servers and S3260 M5 servers

Table 3. Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 4.3(4) Release

Cisco IMC Release

Cisco UCS Manager Release

Rack Mount Servers

  • 4.3(4.252002)

  • 4.3(4.252001)

NA

  • 4.3(4.252002) - Cisco UCS C225 M6 servers

  • 4.3(4.252001) - Cisco UCS C220 M6, C240 M6 servers

4.3(4.242066)

4.3(4f)

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 and S3260 M5 servers

4.3(4.242038)

NA

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 and S3260 M5 servers

4.3(4.241063)

4.3(4b)

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 and S3260 M5 servers

4.3(4.241014)

4.3(4b)

Cisco UCS C245 M8 server

4.3(4.240152)

4.3(4a)

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 and S3260 M5 servers

Table 4. Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 4.3(3) Release

Cisco IMC Release

Cisco UCS Manager Release

Rack Mount Servers

4.3(3.240043)

NA

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 servers

4.3(3.240041)​

NA

  • Cisco UCS S3260 M5 servers

4.3(3.240022)

4.3(3a)

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 and S3260 M5 servers

Table 5. Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 4.3(2) Release

Cisco IMC Release

Cisco UCS Manager Release

Rack Mount Servers

4.3(2.260007)

4.3(6f)

Cisco UCS C220 M5, C240 M5, C480 M5 and C125 M5 servers

4.3(2.250063)

NA

Cisco UCS C220 M5, C240 M5, C480 M5 and C125 M5 servers

4.3(2.250045)

NA

Cisco UCS C220 M5, C240 M5, C480 M5 and C125 M5 servers

4.3(2.250037)

4.3(6c)

Cisco UCS C220 M5, C240 M5, C480 M5 servers

4.3(2.250022)

NA

Cisco UCS C125 M5 servers

4.3(2.250021)

NA

Cisco UCS C240 M5 servers

4.3(2.250016)

NA

Cisco UCS C220 M5, C240 M5, C480 M5, C125 M5 and S3260 M5 servers

4.3(2.240107)

NA

Cisco UCS C220 M5, C240 M5, C480 M5, C125 M5 and S3260 M5 servers

4.3(2.240090)

NA

Cisco UCS C220 M5, C240 M5, C480 M5, C125 M5 and S3260 M5 servers

4.3(2.240077)

NA

Cisco UCS C220 M5, C240 M5, C480 M5, C125 M5 and S3260 M5 servers

4.3(2.240053)

NA

Cisco UCS C220 M5, C240 M5, C480 M5, C125 M5 and S3260 M5 servers

4.3(2.240037)

NA

  • Cisco UCS C225 M6 and C245 M6 servers

4.3(2.240009)

NA

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 servers

  • Cisco UCS C220 M5, C240 M5, C480 M5, C125 M5 and S3260 M5 servers

4.3(2.240002)

4.3(2)

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 servers

  • Cisco UCS C220 M5, C240 M5, C480 M5, C125 M5 and S3260 M5 servers

4.3(2.230270)

4.3(2)

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 servers

  • Cisco UCS C220 M5, C240 M5, C480 M5, C125 M5 and S3260 M5 servers

4.3(2.230207)

4.3(2)

  • Cisco UCS C220 M7 and C240 M7 servers

  • Cisco UCS C220 M6, C240 M6, C225 M6 and C245 M6 servers

  • Cisco UCS C220 M5, C240 M5, C480 M5, C125 M5 and S3260 M5 servers

Table 6. Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 4.3(1) Release

Cisco IMC Release

Cisco UCS Manager Release

Rack Mount Servers

4.3(1.230138)

No Support

Cisco UCS C220 M7 and C240 M7 servers

4.3(1.230124​)

No Support

Cisco UCS C220 M7 and C240 M7 servers

4.3(1.230097)

No Support

Cisco UCS C220 M7 and C240 M7 servers

Table 7. Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 4.2(3) Release

Cisco IMC Release

Cisco UCS Manager Release

Rack Mount Servers

4.2(3p)

4.2(3o)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

Cisco UCS C220 M5, C240 M5, C480 M5, S3260 M5, and C125 M5 servers

4.2(3o)

4.2(3n)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers

4.2(3n)

4.2(3m)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers

4.2(3m)

4.2(3l)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers

4.2(3l)

4.2(3k)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers

4.2(3k)

NA

Cisco UCS S3260 M5 servers

4.2(3j)

4.2(3j)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers

4.2(3i)

4.2(3i)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers

4.2(3g)

4.2(3g)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers

4.2(3e)

4.2(3e)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers

4.2(3d)

4.2(3d)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers

4.2(3b)

4.2(3b)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers

Table 8. Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 4.2(2) Release

Cisco IMC Release

Cisco UCS Manager Release

Rack Mount Servers

4.2(2g)

4.2(2d)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers

4.2(2f)

4.2(2c)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers

4.2(2a)

4.2(2a)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

Cisco UCS C220 M5, C240 M5, C240 SD M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers

Table 9. Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 4.2(1) Release

Cisco IMC Release

Cisco UCS Manager Release

Rack Mount Servers

4.2(1j)

4.2(1n)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

4.2(1i)

4.2(1m)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

4.2(1g)

No Support

Cisco UCS C225 M6 and C245 M6 servers

4.2(1f)

4.2(1k)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

4.2(1e)

4.2(1i)

Cisco UCS C220 M6, C225 M6, C240 M6, and C245 M6 servers

4.2(1c)

No Support

Cisco UCS C225 M6 and C245 M6 servers

4.2(1b)

4.2(1f)

Cisco UCS C220 M6 and C240 M6 servers

4.2(1a)

4.2(1d)

Cisco UCS C220 M6, C240 M6, and C245 M6 servers

Note

 

Cisco UCS Manager does not support Cisco UCS C245 M6 servers.

Table 10. Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 4.1(3) Release

Cisco IMC Release

Cisco UCS Manager Release

Rack Mount Servers

4.1(3n)

NA

Cisco UCS C220 M5, C240 M5, C480 M5, S3260 M5 and S3260 M4 servers

4.1(3m)

4.1(3m)

Cisco UCS C220 M5, C240 M5, C480 M5, S3260 M5 and S3260 M4 servers

4.1(3l)

4.1(3k)

Cisco UCS C480 M5, C220 M5, C240 M5 servers

4.1(3i)

4.1(3j)

Cisco UCS C220 M5, C240 M5, C480 M5, S3260 M4, S3260 M5, C125 M5 servers

4.1(3h)

4.1(3i)

Cisco UCS C220 M5, C240 M5, C480 M5, S3260 M4, S3260 M5, C125 M5 servers

4.1(3g)

No Support

Cisco UCS S3260 M4 and S3260 M5 servers

4.1(3f)

4.1(3h)

Cisco UCS C220 M5, C240 M5, C480 M5, S3260 M4, S3260 M4, S3260 M5, and C125 M5 servers

4.1(3d)

4.1(3e)

Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5, and C125 M5 servers

4.1(3c)

4.1(3d)

Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5 and C125 M5 servers

4.1(3b)

4.1(3a)

Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M4, S3260 M5 and C125 M5 servers

Table 11. Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 4.1(2) Release

Cisco IMC Release

Cisco UCS Manager Release

Rack Mount Servers

4.1(2m)

No Support

Cisco UCS C220 M4, C240 M4 and C460 M4 servers.

4.1(2l)

No Support

Cisco UCS C220 M4 and C240 M4 servers.

4.1(2k)

No Support

Cisco UCS C220 M4, C240 M4, and C460 M4 servers

4.1(2j)

No Support

Cisco UCS C220 M4, C240 M4, and C460 M4 servers

4.1(2h)

No Support

Cisco UCS C220 M4, C240 M4, and C460 M4 servers

4.1(2g)

No Support

Cisco UCS C220 M4, C240 M4, and C460 M4 servers

4.1(2f)

4.1(2c)

Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers

4.1(2e)

No Support

Cisco UCS C125 M5 servers

4.1(2d)

No Support

Cisco UCS C240 M5 and C240 SD M5 servers

4.1(2b)

4.1(2b)

Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers

4.1(2a)

4.1(2a)

Cisco UCS C220 M5, C240 SD M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers

Table 12. Cisco IMC and UCS Manager Software Releases for Rack Mount Servers for Cisco IMC 4.1(1) Release

Cisco IMC Release

Cisco UCS Manager Release

Rack Mount Servers

4.1(1h)

4.1(1e)

Cisco UCS C220 M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers

4.1(1g)

4.1(1d)

Cisco UCS C220 M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers

4.1(1f)

4.1(1c)

Cisco UCS C220 M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers

4.1(1d)

4.1(1b)

Cisco UCS C220 M5, C240 M5, C480 M5, and C480 ML M5 servers

4.1(1c)

4.1(1a)

Cisco UCS C220 M5, C240 M5, C480 M5, C480 ML M5, S3260 M5, C125 M5, C220 M4, C240 M4, C460 M4, and S3260 M4 servers

Operating System and Browser Requirements

For detailed information about supported Operating System, see the interactive UCS Hardware and Software Compatibility matrix.

Cisco recommends the following browsers for Cisco UCS Rack Server Software, Release 4.3(6):

Recommended Browser

Minimum Recommended Browser Version

Minimum Recommended Operating System

Google Chrome

Version 134.0.6998.89 (Official Build) (64-bit)

Microsoft Windows 11 Enterprise
Version 134.0.6998.37 (Official Build) (64-bit)
Version 133.0.6943.127 (Official Build) (64-bit)

Version 133.0.6943.141 (Official Build) (64-bit)

Version 133.0.6943.127 (Official Build) (arm64)

Mac OS 15.3.1


Note


If the management client is launched using an unsupported browser, check the help information from the For best results use supported browsers option available in the login window for the supported browser versions.


Transport Layer Security (TLS) version 1.2.

Default Ports

Following is a list of server ports and their default port numbers:

Table 13. Server Ports

Port Name

Port Number

LDAP Port 1

389

LDAP Port 2

389

LDAP Port 3

389

LDAP Port 4

3268

LDAP Port 5

3268

LDAP Port 6

3268

SSH Port

22

HTTP Port

80

HTTPS Port

443

SMTP Port

25

KVM Port

2068

Intersight Management Port

8889

Intersight Cloud Port

8888

SOL SSH Port

2400

SNMP Port

161

SNMP Traps

162

External Syslog

514

Upgrade and Downgrade Guidelines

The section provides information on the upgrade paths to release 4.3.6.

Cisco IMC 4.3(6.250039) release supports Cisco UCS C220 M8 and Cisco UCS C240 M8 servers (in addition to Cisco UCS S3260 M5 servers).

In addition, Cisco IMC 4.3(6.250040) release supports the following servers:

  • Cisco UCS C225 M8

  • Cisco UCS C245 M8

  • Cisco UCS C220 M7

  • Cisco UCS C240 M7

  • Cisco UCS C220 M6

  • Cisco UCS C240 M6

  • Cisco UCS C245 M6

  • Cisco UCS C225 M6

To get a complete overview of all the possible upgrade paths in Cisco IMC, see Cisco UCS Rack Server Upgrade Support Matrix.

Downgrade Limitation for Release 4.3(4.240152):

See Cisco UCS Rack Server Upgrade Support Matrix to view your server upgrade path.

Downgrade Limitation for Release 4.3(3.240022):

In the release 4.3(3.240022), you cannot downgrade the Cisco UCS M7 servers with 5th Gen Intel® Xeon® processors.

When you try to downgrade Cisco IMC, the following error message is displayed on CLI, GUI, Redfish API and XML API user interfaces:

Error message during BMC downgrade with different interfaces like CLI/WEBUI/Redfish/XML =

“Update aborted. INCOMPATIBLE_IMAGE”

When you try to downgrade BIOS, the following error message is displayed on CLI, GUI, Redfish API and XML API user interfaces:

CPU ID mismatch between uploaded image and the platform.


Note


You can downgrade Cisco UCS M7 servers with 4th Generation Intel® Xeon® Scalable Processors.


Infrastructure Upgrade and Downgrade to Release 4.3(2):

  • Cisco UCS M4 servers are not supported by 4.3(2.230207) and later releases.

  • You must perform firmware update after adding any new hardware component to the system.

  • If you are planning to install Cisco UCS VIC 15237 or 15427 in a server, then upgrade the server to 4.3(2.230270) or later versions and then insert the adapter into the server.

    If you insert Cisco UCS VIC 15237 or 15427 into the server that is running earlier versions than 4.3(2.230270), then upgrade the server to 4.3(2.230270) or later versions and power cycle the server to recognize the adapter.

  • If you are planning to install Cisco UCS VIC 15235 or 15425 in a server, then upgrade the server to 4.3(2.230207) or later versions and then insert the adapter into the server.

    If you insert Cisco UCS VIC 15235 or 15425 into the server that is running earlier versions than 4.3(2.230207), then upgrade the server to 4.3(2.230207) or later versions and power cycle the server to recognize the adapter.

Support for Cisco UCS C245 M8 Servers

Cisco UCS C245 M8 servers are supported from the release 4.3(4.241014) onwards.

Support for Cisco UCS M7 Servers

Cisco UCS M7 servers are supported from the release 4.3(1.230097) onwards.

The following releases are for Cisco UCS M7 servers only:

  • 4.3(1.230138)

  • 4.3(1.230124​)

  • 4.3(1.230097)

Firmware Files

Firmware Files

The C-Series software release includes the following software files:

CCO Software Type File name(s) Comment
Unified Computing System (UCS) Server Firmware

For release specific ISO versions, see Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3

Host Upgrade Utility
Unified Computing System (UCS) Drivers

ucs-cxxx-drivers.4.3(6.250040).iso

ucs-cxxx-drivers.4.3(6.250039).iso

Drivers
Unified Computing System (UCS) Utilities

ucs-cxxx-utils-efi.4.3(6.250039).iso

ucs-cxxx-utils-linux.4.3(6.250039).iso

ucs-cxxx-utils-vmware.4.3(6.250039).iso

ucs-cxxx-utils-windows.4.3(6.250039).iso

ucs-cxxx-utils-efi.4.3(6.250040).iso

ucs-cxxx-utils-linux.4.3(6.250040).iso

ucs-cxxx-utils-vmware.4.3(6.250040).iso

ucs-cxxx-utils-windows.4.3(6.250040).iso

Utilities

Note


Always upgrade the BIOS, the Cisco IMC and CMC from the HUU ISO. Do not upgrade individual components (only BIOS or only Cisco IMC), since this could lead to unexpected behavior. If you choose to upgrade BIOS, and the Cisco IMC individually and not from the HUU ISO, make sure to upgrade both Cisco IMC, and BIOS to the same container release. If the BIOS and the Cisco IMC versions are from different container releases, it could result in unexpected behavior. Cisco recommends that you use the Update All option from the Host Upgrade Utility to update the firmware versions of Cisco IMC, BIOS, and all other server components (VIC, RAID Controllers, PCI devices, and LOM) together.


Host Upgrade Utility

The Cisco Host Upgrade Utility (HUU) is a tool that upgrades the Cisco UCS C-Series firmware.

The image file for the firmware is embedded in the ISO. The utility displays a menu that allows you to choose which firmware components to upgrade. For more information on this utility, see http://www.cisco.com/en/US/products/ps10493/products_user_guide_list.html.

For details of firmware files in Cisco Host Upgrade Utility for individual releases, see Cisco UCS C-Series Integrated Management Controller Firmware Files, Release 4.3.

Updating the Firmware

Use the Host Upgrade Utility to upgrade the C-Series firmware. Host Upgrade Utility can upgrade the following software components:

  • BIOS

  • Cisco IMC

  • CMC

  • Cisco VIC Adapters

  • Broadcom Adapters

  • Microchip Adapters

  • LAN on Motherboard

  • PCIe adapter firmware

  • HDD firmware

  • SAS Expander firmware

  • DCPMM Memory

  • PCI Gen5 retimer

All firmware should be upgraded together to ensure proper operation of your server.


Note


We recommend that you use the select all and Update or Update & Activate All option from the Host Upgrade Utility to update the firmware versions of Cisco IMC, BIOS and all other server components (VIC, RAID Controllers, PCI devices, and LOM) together. Click Exit once you deploy the firmware.


For more information on how to upgrade the firmware using the utility, see:

http://www.cisco.com/c/en/us/support/servers-unified-computing/ucs-c-series-rack-servers/products-user-guide-list.html

Software Utilities

The following standard utilities are available:

  • Host Update Utility (HUU)

  • Server Configuration Utility (SCU)

  • Server Diagnostic Utility (SDU)

The utilities features are as follows:

  • Availability of HUU, SCU on the USB as bootable images. The USB also contains driver ISO, and can be accessed from the host operating system.

New Hardware in Release 4.3(6)

New Hardware in Release 4.3(6.250039)

The following new hardware are supported in Release 4.3(6.250039):

Cisco UCS C220 M8 Server

The 1RU, 2-socket Cisco UCS C220 M8 server is designed to meet the needs of customers that choose to deploy high density rack-mount servers. It combines the latest Intel® processors and is a versatile general-purpose application and infrastructure server delivering leading performance and efficiency for a wide range of workloads, including virtualization, collaboration, and bare-metal applications.

The Cisco UCS C220 M8 server extends the capabilities of the Cisco UCS rack server portfolio incorporating Intel Xeon® 6 CPUs. It improves security, performance, and efficiency while helping achieve sustainability goals with built-in accelerators the such as Intel Trust Domain Extensions (TDX), Intel Data Streaming Accelerator (DSA), Intel QuickAssist Technology (QAT), Intel Advanced Matrix Extensions (AMX), and Intel In-Memory Analytics Accelerator (IAA).

Operating Expenses (OpEx) for power and cooling, management, and maintenance can be decreased by consolidating older servers onto the latest generation of Cisco UCS C220 M8 Rack Servers.

The Cisco UCS C220 M8 server is a dense, fault-tolerant server that provides value, performance, and flexibility for both commercial and enterprise customers.

The Cisco UCS C220 M8 server offers the following:

  • Processors: Up to 2x Intel Xeon 6700P or 6500P processors (1 or 2)

  • Memory:

    • 32 DIMM slots (16 DIMMS per CPU): 16, 32, 48, 64, 96, 128GB DDR5 at up to 6400 MT/s for up to 4TB of memory

      32, 64GB MRDIMMs at up to 8000 MT/s

  • PCIe expansion: Up to 3 PCIe 5.0 half-height slots or up to 2 PCIe 5.0 full-height slots plus 1 dedicated 24-Gbps RAID controller slot and 1 dedicated mLOM/OCP 3.0 slot

  • RAID controllers:

    • Cisco® 24-Gbps modular tri-mode RAID controller supports SAS 4 or NVMe hardware RAID

    • Cisco 24-Gbps modular tri-mode SAS Host Bus Adapter (HBA)

  • Internal storage:

    • Backplane options: Up to 10 SFF SAS/SATA/U.3 NVMe drives through SAS4 tri-mode RAID or HBA controller, with optional up to eight direct-attach U.2/U.3 NVMe drives

      Up to 16 E3.S 1T direct-attach NVMe drives at PCIe Gen5 x4 each

  • mLOM/OCP 3.0:

    • One dedicated PCIe Gen5x16 slot that can be used to add an mLOM or OCP 3.0 card for additional rear-panel connectivity

    • mLOM slot can flexibly accommodate 10/25/50 and 40/100/200 Gbps Cisco VIC adapters

    • OCP 3.0 slot features full out-of-band manageability that supports Intel X710 OCP dual 10GBase-T through mLOM interposer

  • Power supplies: Hot-pluggable, redundant platinum, and titanium options:

    • Platinum: 1050W DC and 1600W AC

    • Titanium: 1200W AC and 2300W AC

  • Other storage:

    • Dedicated Baseboard Management Controller (BMC) FlexMMC for utilities (on board)

    • Dual M.2 SATA SSDs (internal or hot-swappable) with HW RAID support

  • GPU: Up to three single-wide GPUs supported

Cisco UCS C240 M8 Server

The 2RU, 2-socket Cisco UCS C240 M8 server offers I/O flexibility and larger storage capacity. It combines the fastest Intel® processors and is a versatile general-purpose application and infrastructure server delivering leading performance and efficiency for a wide range of workloads, including AI, big-data analytics, databases, collaboration, virtualization, and high-performance computing.

The Cisco UCS C240 M8 server extends the capabilities of the Cisco UCS rack server portfolio by incorporating Intel Xeon® 6 CPUs. It improves security, performance, and efficiency while helping you achieve your sustainability goals with built-in accelerators such as Intel Trust Domain Extensions (TDX), Intel Data Streaming Accelerator (DSA), Intel QuickAssist Technology (QAT), Intel Advanced Matrix Extensions (AMX), and Intel In-Memory Analytics Accelerator (IAA).

You are able to decrease server Operating Expenses (OpEx) for power and cooling, management, and maintenance by consolidating older servers onto the latest generation of Cisco UCS C240 M8 Server.

The Cisco UCS C240 M8 server offers the following:

  • Processors: Up to 2x Intel Xeon 6700P or 6500P processors (1 or 2)

  • Memory

    • 32 DIMM slots (16 DIMMS per CPU): 16, 32, 48, 64, 96, 128, 256GB DDR5 at up to 6400 MT/s for up to 8TB of memory

      32, 64GB MRDIMMs at up to 8000 MT/s

  • PCIe expansion: Up to 8 PCIe 5.0 slots plus 1 dedicated 24-Gbps RAID controller slot and 1 dedicated mLOM/OCP 3.0 slot

  • RAID controllers:

    • Cisco 24-Gbps modular tri-mode RAID controller supports SAS 4 or NVMe hardware RAID

    • Cisco 24-Gbps modular tri-mode SAS Host Bus Adapter (HBA)

  • Internal storage:

    • Backplane options: Up to 28 SFF SAS/SATA/U.3 NVMe drives through SAS4 tri-mode RAID or HBA controller, with optional up to eight direct-attach U.2/U.3 NVMe drives

      Up to 36 E3.S 1T direct-attach NVMe drives

      Up to 16 LFF SAS HDDs plus optional 4 rear SFF HDD/SSDs

  • mLOM/OCP 3.0: One dedicated PCIe Gen5x16 slot that can be used to add an mLOM or OCP 3.0 card for additional rear-panel connectivity

    mLOM slot can flexibly accommodate 10/25/5010/25/40, and 40/100/200 100-Gbps Cisco VIC adapters

    OCP 3.0 slot features full out-of-band manageability that supports Intel X710 OCP Dual 10GBase-T via mLOM interposer

  • Power supplies: Hot-pluggable, redundant platinum and titanium options:

    • Platinum: 1050W DC and 1600W AC

    • Titanium: 1200W AC and 2300W AC

  • Other storage:

    • Dedicated Baseboard Management Controller (BMC) FlexMMC for utilities (on board)

    • Dual M.2 SATA SSDs (internal or hot-swappable) with HW RAID support

  • GPU: Up to three double-wide or eight single-wide GPUs supported

GPU Support

Extended support for the following existing GPUs:

GPU

Server

NVIDIA H100-NVL GPU 400W, 94GB, 2-slot FHFL (UCSC-GPU-H100-NVL)

Cisco UCS C240 M8 Server

NVIDIA TESLA A16 PCIE 250W 4X16GB (UCSC-GPU-A16)

NVIDIA L40S: 350W, 48GB, 2-slot FHFL GPU (UCSC-GPU-L40S)

NVIDIA L4:70W, 24GB, 1-slot HHHL GPU (UCSC-GPU-L4)

NVIDIA L4:70W, 24GB, 1-slot HHHL GPU (UCSC-GPU-L4)

Cisco UCS C220 M8 Server

Third Party Adapters

Support for the following NVIDIA OEM adapters with Cisco UCS C220 M8 and C240 M8 servers:

  • NVIDIA OEM MCX623436AC-CDAB CX6Dx 2x100G QSFP56 x16 OCP NIC (UCSC-O-N6CD100GFO)

  • NVIDIA OEM MCX623106AC-CDAT 2x100 GbE QSFP56 PCIe Crypto Enabled (UCSC-P-M6CD100GFO)

  • NVIDIA OEM MCX623106AS-CDAT 2x100 GbE QSFP56 PCIe Crypto Disabled (UCSC-P-M6DD100GFO)

  • NVIDIA OEM MCX631432AC-ADAB CX6Lx 2x25G SFP28 x8 OCP NIC (UCSC-O-N6CD25GFO)

  • NVIDIA OEM MCX755106AS-HEAT 2x200GbE QSFP112 Gen5x16, PCIe VPI NIC; No Crypto (UCSC-P-N7D200GFO)

  • NVIDIA OEM MCX713104AS-ADAT CX-7 4x25GbE SFP56 Gen4 x16 PCIe NIC (UCSC-P-N7Q25GFO)

  • NVIDIA OEM MCX715105AS-WEAT CX-7 1x400GbE QSFP112 PCIe Gen5 x16 VPI NIC (UCSC-P-N7S400GFO)

Support for the following BlueField adapters with Cisco UCS C220 M8 and C240 M8 servers:

  • NVIDIA BlueField-3 B3210E DPU 2x100G QSFP112, PCIe Gen5.0 x16, Crypto Disabled (900-9D3B6-00CC-EA0)

    NVIDIA BlueField-3 B3220L SuperNIC 2x200G QSFP112, PCIe Gen5.0 x16, Crypto Disabled (UCSC-P-N3220L)

New Software in Release 4.3(6)

New Software Features in Release 4.3(6.250040)

Cisco IMC extends its current functionalities and features to Cisco UCS C-series C220 M8 and C240 M8 servers. The following new software features are supported in Release 4.3(6.250039) and 4.3(6.250040).

  • Cisco IMC now includes thermal management as an additional essential aspect of performance monitoring to ensure that the hardware operates within safe temperature limits.

    The administrators can set temperature threshold parameters for the different server components using Cisco IMC Web user interface. These temperature threshold parameters are crucial for maintaining the balance between performance and safety, ensuring that the server operates efficiently without risking damage due to overheating.

  • Trunk mode support with Physical NIC mode

    We can assign VLAN at host on a physical NIC mode interface to ensure that the packets are correctly VLAN tagged.

  • Support for PXE Boot in IPv6-only environments using UEFI mode for LAN Boot.

    This enhancement allows administrators to operate in modern network settings while minimizing the dependency on IPv4 addresses, ensuring efficient server provisioning and management.

  • 50G support is available with Cisco UCS VIC 15428, 15425 and 15427 adapters.

    For more information, see https://www.cisco.com/c/en/us/products/collateral/interfaces-modules/unified-computing-system-adapters/ucs-vic-15000-series-ds.html.

  • 10G speed support on Cisco UCS VIC 15000 series adapters is available with dual-rate 10/25G transceiver on Cisco IMC.

  • Cisco UCS servers are IPv6 Ready Logo Certified.

Deprecated Hardware and Software in Cisco IMC

Release 4.3(3.240022)

Beginning with Cisco IMC release 4.3(3.240022), the following Cisco UCS M5 servers are not supported:

  • Cisco UCS C125 M5

  • Cisco UCS C220 M5

  • Cisco UCS C240 M5

  • Cisco UCS C240 SD M5

  • Cisco UCS C480 M5

  • Cisco UCS C480 ML M5

The Cisco UCS M5 servers mentioned above will continue to be supported on the final supported software release version (4.3(2.x)) with applicable patches, going forward.

Resolved Caveats

Resolved Caveats in Release 4.3(6.260017)

The following defects were resolved in Release 4.3(6.260017):

Defect ID

Symptom

First Release Affected

Resolved in Release

CSCwr84583

On Cisco UCS M5 and M6 servers running firmware version 4.3(2.240009), TLS session establishment repeatedly fails.

This issue occurs when Cisco IMC sends the Change Cipher Spec (CCS) and encrypted handshake messages; the Syslog server often responds with FIN, ACK, and/or RST packets.

Server logs typically display GnuTLS errors and indicate forced session closure.

This issue is resolved.

4.3(2.240009)

4.3(6.260017)

CSCwi71153

In Cisco UCS M5 and M6 servers, BMC reset occurs due to watchdog reset caused by kernel scheduler null pointer dereference.

A kernel panic in the BMC OS causes the BMC to become unresponsive. The watchdog timer detects this and resets the BMC to recover its functionality.

The server OS is not impacted by this process. Only management functions provided by the BMC—such as remote management, virtual media, and hardware monitoring—will be temporarily unavailable while the BMC restarts.

This issue is resolved.

4.2(3b)

4.3(6.260017)

Resolved Caveats in Release 4.3(6.260003)

The following defects were resolved in Release 4.3(6.260003):

Defect ID

Symptom

First Release Affected

Resolved in Release

CSCwr46765

When setting up Cisco UCS C-Series servers, if the BMC time has not yet synchronized with the BIOS and the RAID controller's certificate has a newer date, then Cisco IMC may display the following error on the RAID controller:

Description: Storage controller MRAID inoperable: reseat or replace the storage controller MRAID

Severity: critical

Cause: equipment-inoperable

Description: Unauthorized card detected, replace the adapter

However, this is expected behavior because the RAID cannot authenticate as the BMC time is still earlier than the device certificate date. And this results in SPDM Authentication Failure.

4.3(6.250040)

4.3(6.260003)

CSCwr64033

After performing a Reset to Factory Defaults (RFD) on a Cisco UCS C-series M8 server, it is not possible to access the Cisco IMC using the default credentials.

When attempting the initial CIMC configuration using the [F8] menu, the following error appears:

Current CIMC password does not match.

This error may also occur on a previously working server immediately after an RFD (Reset to Factory Defaults) operation.

4.3(6.250053)

4.3(6.260003)

CSCws30219

Cisco UCS M7 servers are susceptible to host lockups triggered by ECC (Error Correcting Code) memory events.

This issue is specifically related to how the server’s BIOS interacts with the EFI (Extensible Firmware Interface) during error conditions. During these events, the BIOS does not correctly retrieve a required variable, causing EFI to return an invalid parameter. As a result, the operating system is unable to continue normal operation and freezes without logging any errors. When this occurs, the host becomes unresponsive and KVM (keyboard, video, mouse) input is not accepted.

Single-bit ECC errors—while not logged due to DDR5 specifications—can trigger this condition, resulting in complete loss of host responsiveness.

4.3(6.250053)

4.3(6.260003)

Resolved Caveats in Release 4.3(6.250117)

The following defects were resolved in Release 4.3(6.250117):

Defect ID

Symptom

First Release Affected

Resolved in Release

CSCwr75284

On Cisco UCS C220 M7 servers with Intel processors, enabling immersion cooling mode may trigger frequent soft PSOC faults, which causes the host power state to become locked.

When this happens, you cannot change the server’s power state from either the web interface or the IMM. This behavior does not occur when the servers use standard air cooling.

To avoid this problem in immersion cooling mode, the system has been updated, so that soft PSOC faults no longer lock the host power.

4.3(6.250053)

4.3(6.250117)

Resolved Caveats in Release 4.3(6.250101)

The following defects were resolved in Release 4.3(6.250101):

Defect ID

Symptom

First Release Affected

Resolved in Release

CSCwq61388

On Cisco UCS C220 M6 servers running firmware version 4.3.5 or later, enabling VMD in BIOS with multiple NVME drives can cause storage subsystem initialization to exceed 15 minutes, leading to Intersight Server Profile deployment failures. Disabling VMD or reducing the number of drives can resolve the issue. Earlier firmware versions may not be affected.

.

4.3(5.250001)

4.3(6.250101)

Resolved Caveats in Release 4.3(6.250060)

The following defects were resolved in Release 4.3(6.250060):

Defect ID

Symptom

First Release Affected

Resolved in Release

CSCwq74490

On Cisco UCS C245 M8 platform with AMD EPYC 9655 processors, fully loaded NVIDIA L4 GPUs occasionally experience PCIe link width downgrades on random slots when running the Linux Rebooter Stress test. This can cause GPUs to operate at reduced speeds in the OS environment.

4.3(6.250053)

4.3(6.250060)

Resolved Caveats in Release 4.3(6.250053)

The following defects were resolved in Release 4.3(6.250053):

Defect ID

Symptom

First Release Affected

Resolved in Release

CSCwo79652

Cisco IMC CLI might not show the command:

set admin-link-training

In addition, Cisco IMC CLI might not display the details for Admin Link Training and Oper Link Training.

4.3(6.250039)

4.3(6.250040)

4.3(6.250053)

CSCwo67388

In Cisco UCS C220 M8 and C240 M8 servers operating in Standalone or IMM mode, Cisco IMC does not verify the new password against the previously used passwords.

The number of previously used passwords that are saved in Cisco IMC depends on the latest value configured in the Password History setting.

You can configure this setting any number of times to any valid value between 1 to 5.

4.3(6.250012)

4.3(6.250053)

Resolved Caveats in Release 4.3(6.250044)

The following defects were resolved in Release 4.3(6.250044):

Defect ID

Symptom

First Release Affected

Resolved in Release

CSCwm45755

M.2 SATA disks connected to storage controllers on the MSTOR-RAID slot are not being detected during the installation of Windows Server 2025.

The affected storage controllers are:

  • UCS-M2-HWRAID2 on Cisco UCS C220/C240 M8 Servers

  • UCSC-M2RM-M8 on Cisco UCS C220/C240 M8 Servers

  • UCSC-M2RR-240M8 on Cisco UCS C240 M8 Servers

This issue is specific to Windows Server 2025 for the storage controllers mentioned above.

These M.2 disks, however, are detected and fully functional in Windows Server 2022 or other operating systems.

4.3(6.250039)

4.3(6.250044)

Resolved Caveats in Release 4.3(6.250040)

The following defects were resolved in Release 4.3(6.250040):

Defect ID

Symptom

First Release Affected

Resolved in Release

CSCwn22341

HSU Redfish API update fails for Cisco UCS VIC 15xxx adapters with "ApplyTime":"OnNextBoot" option and when the target contains only VIC adapters.

This issue is now resolved.

4.3.5.240021

4.3(6.250039)

4.3(6.250040)

CSCwn48372

In Cisco UCS M8 servers, setting the BIOS token to "Auto" for CbsCmnEfficiency

ModeEnRs results in the value being displayed as High Performance Mode.

This issue is now resolved.

4.3.5.240021

4.3(6.250039)

4.3(6.250040)

Open Caveats

Open Caveats in Release 4.3(6.260003)

The following defects were open in Release 4.3(6.260003):

Defect ID

Symptom

Workaround

First Affected Release

CSCwt41941

In Cisco UCS M8 servers, the system may become stuck in the KVM console and fail to boot, accompanied by BIOS attestation failure messages. POST processes might hang or not complete, and CATERR events can be logged. NVME devices may become inoperable, and temperature sensor failures along with critical thermal threshold errors can occur.

These issues arise when downgrading firmware from the following release versions to earlier releases that use SSP 1.6.

  • 4.3(6.260003)

  • 6.0(1.250192)

The above release versions are integrated with SSP Protocol Version 2.0.

The SSP Protocol Version 2.0 introduced in these later releases is not backward compatible with SSP 1.6, causing the BMC to fail BIOS attestation and resulting in system stability and hardware errors.

  1. Upgrade only the BMC firmware component to the latest version using the Host Server Utility (HSU) or the Cisco IMC interface.

  2. Perform a host reset.

    Performing a host reset may help recover the state, but it is not guaranteed to be 100% effective.

The supported latest release versions include:

  • 4.3(6.260003)

  • 6.0(1.250192)

The above release versions are integrated with SSP Protocol Version 2.0.

Avoid downgrading from these versions to earlier releases that do not support SSP Protocol Version 2.0.

  • 4.3(6.260003)

  • 6.0(1.250192)

Open Caveats in Release 4.3(6.250053)

The following defects were open in Release 4.3(6.250053):

Defect ID

Symptom

Workaround

First Affected Release

CSCws30219

Cisco UCS M7 servers are susceptible to host lockups triggered by ECC (Error Correcting Code) memory events.

This issue is specifically related to how the server BIOS interacts with the EFI (Extensible Firmware Interface) during error conditions.

During these events, the BIOS does not correctly retrieve a required variable, causing EFI to return an invalid parameter.

As a result, the operating system is unable to continue normal operation and freezes without logging any errors. When this occurs, the host becomes unresponsive and KVM (keyboard, video, mouse) input is not accepted.

Single-bit ECC errors—while not logged due to DDR5 specifications—can trigger this condition, resulting in complete loss of host responsiveness.

Downgrade to version 4.3(6.250044) or an earlier release.

4.3(6.250053)

Open Caveats in Release 4.3(6.250101)

The following defects are open in Release 4.3(6.250101):

Defect ID

Symptom

Workaround

First Affected Release

CSCwo52218

When a Cisco UCS S3260 M5 server has undergone a NIC mode change since the chassis's last power-on, its management IP address may become unreachable following an AC power cycle or a reboot of the Active CMC (Chassis Management Controller).

The gateway is set to 0.0.0.0 after AC power cycle or reboot of active CMC.

There is no workaround.

3.1(3a)

Open Caveats in Release 4.3(6.250039)

The following defects are open in Release 4.3(6.250039) and 4.3(6.250040):

Defect ID

Symptom

Workaround

First Affected Release

CSCwo60509

In Cisco UCS C240 M8 servers, if the controller is attached in NoRaid system and U.3 NVMe drives are to be used under the controller, then either perform Backplane Reset to Default or manually change backplane management to controller-attached

If NoRaid system needs to be inserted with the Storage card and U.3 NVMe drives are to be used under the controller, then either perform Backplane reset to factory default or manually change the Backplane Management slot personality to Controller-attached.

4.3(6.250039)

CSCwn95239

In Cisco UCS servers, the server does not get powered on due to BIOS corruption.

The following message is displayed:

Power on failure asserted [Power on Fail, Server failed to power-on]

This issue might occur when the BIOS flashing is interrupted due to CMOS clear operation triggered during update or Factory default, Cisco IMC reboot or any other operation.

  • Reboot Cisco IMC.

  • Activate backup BIOS.

  • Update BIOS and activate it.

4.3(6.250039)

4.3(6.250040)

CSCwn47257

The VIC firmware is displayed with G at the end.

For example: 5.3(5.32)-48G.

Flash the same image and perform the power-cycle of the host.

4.3(6.250039)

4.3(6.250040)

CSCwo67280

In Cisco UCS servers with the Cisco IMC release version 4.3.5.250001, the VIC OOB firmware update is not triggered in the CLI for the activate command.

Use other user interfaces to activate the VIC firmware.

In the CLI, use the no-activate command to trigger and perform the power-cycle of the host manually.

4.3(6.250039)

4.3(6.250040)

CSCwm33093

Virtual disk is displayed as Inoperable state when the disks are in online state.

Drive assignments to the span are firmware driven to optimize the performance.

Due to this, user-provided span details is over-ridden by firmware.

For the span inventory, use the arcconf output to know the exact drive assignments in the spans.

Whatever is configured in the span assignment using the management tools will not be honoured because the firmware overrides with its own assignment to optimize the performance.

4.3.5.250030

CSCwo79652

Cisco IMC CLI might not show the command:

set admin-link-training

In addition, Cisco IMC CLI might not display the details for Admin Link Training and Oper Link Training.

Use the Cisco IMC GUI to configure Admin Link Training or to view the details of Admin Link Training and Oper Link Training.

4.3(6.250039)

4.3(6.250040)

CSCwn44614

When Pre-Boot DMA Protection is enabled on Cisco UCS C220 M8 servers, you may experience slowness while downloading the OS ISO image via HTTP/HTTPS boot. This issue occurs during the pre-boot process when attempting HTTP/HTTPS boot with this configuration.

Disable Pre Boot DMA Protection BIOS Policy token

4.3(6.250039)

CSCwn51498

Raw OEM SEL records are logged in CIMC SEL during the booting and shutdown of Windows Server 2025 on Cisco UCS C220 M8 servers.

Ignore the Raw OEM SEL records logged while booting Windows 2025.

4.3(6.250039)

CSCwn99720

On Cisco UCS C-Series M8 servers with Intel processors and an R1S CPU configured in a single CPU setup on the 2S platform, Intel SGX remains disabled even after being enabled in the BIOS.

This issue does not occur with a dual CPU configuration.

There is no known workaround.

4.3(6.250039)

CSCwm45755

M.2 SATA disks connected to storage controllers on the MSTOR-RAID slot are not being detected during the installation of Windows Server 2025.

The affected storage controllers are:

  • UCS-M2-HWRAID2 on Cisco UCS C220/C240 M8 Servers

  • UCSC-M2RM-M8 on Cisco UCS C220/C240 M8 Servers

  • UCSC-M2RR-240M8 on Cisco UCS C240 M8 Servers

This issue is specific to Windows Server 2025 for the storage controllers mentioned above.

These M.2 disks, however, are detected and fully functional in Windows Server 2022 or other operating systems.

There is no known workaround.

4.3(6.250039)

CSCwr10524

In Cisco UCS M6 servers with firmware release version 4.3(2.230207) and secure VIC 15xxx adapters, the firmware upgrade to the release versions 4.3(4.xxxxx) / 4.3(5.xxxxx) / 4.3(6.xxxxx) / 6.0(1.250127) using the HUU Web UI or NI-HUU results in BIOS activation failure.

The issue occurs if any one or both of the following secure VICs are present:

  • Cisco UCS VIC 15235

  • Cisco UCS VIC 15425

If the update is initiated through the HUU GUI, then the interface first displays a failure message regarding secure VIC activation, followed by another message to proceed with a host power cycle.

After a manual host power cycle, all the component firmware are activated with the latest firmware except for BIOS. Retriggering firmware update does not help in activating the BIOS component.

If the update is initiated through NI-HUU, then the script execution fails with the following error message:

Error - Firmware update failed because it timed out. Check host for details.

After a manual host power cycle, all the component firmware are activated with the latest firmware except for BIOS. Retriggering firmware update does not help in activating the BIOS component.

You can perform any one of the following workarounds:

Perform the firmware upgrade using the HSU Redfish.

OR

Perform a step upgrade as listed below:

  1. Upgrade from the release version 4.3(2.230207) to 4.3(2.230270)

  2. Upgrade from the release version 4.3(2.230270) to any of the following releases -

    • 4.3(4.xxxxx)

    • 4.3(5.xxxxx)

    • 4.3(6.xxxxx)

    • 6.0(1.xxxxx)

OR

Perform the following steps in Cisco IMC Web UI:

  1. From the Apps drop-down list, select Administration.

  2. In the Navigation pane, click Firmware Management menu.

  3. In the Firmware Management area, select a component from the Component column and click Upload.

  4. The Update Firmware dialog box appears.

  5. Update the secure VIC 15xxx firmware.

  6. Update the remaining components by booting HUU.

4.3(4.240152)

Known Behaviour and Limitations

Known Behaviors and Limitations in Release 4.3(6.250040)

Known Behaviors and Limitations

The following caveats are known limitations in release 4.3(6.250039) and 4.3(6.250040):

Defect ID

Symptom

Workaround

First Affected Release

CSCwn60053

In Cisco UCS M8 servers, when a tampered VIC is detected, the following message is displayed:

No Signal. Reason: Host is powered but no output on video, Press any key to wakeup.

The Post command does not get completed on the host and the overall system health is displayed as Critical.

The following message is displayed in the fault summary:

Adapter [MLOM/PCI] secure validation failed.

There is no workaround.

4.3(6.250039)

4.3(6.250040)

CSCwn26554

The host reboots for the below mentioned combinations, when BMC reboots abruptly when HSU update is in-progress:

  • ApplyTime":"OnNextBoot" 
    and "Targets":
    ["/redfish/v1/UpdateService/
    FirmwareInventory/BIOS",
    "/redfish/v1/UpdateService/
    FirmwareInventory/CIMC"]}'
  • ApplyTime":"OnNextBoot" 
    and "Targets":
    ["/redfish/v1/UpdateService/
    FirmwareInventory/BIOS"]}'
  • ApplyTime":"OnNextBoot" 
    and "Targets":
    ["/redfish/v1/UpdateService/
    FirmwareInventory/CIMC"]}'

HSU Update flow works fine in the case of "ApplyTime":"Immediate" for all the below mentioned target combinations:

  • "Targets":["/redfish/v1/
    UpdateService/
    FirmwareInventory/BIOS",
    "/redfish/v1/
    UpdateService/
    FirmwareInventory/CIMC"]}'
  • "Targets":["/redfish/v1/
    UpdateService/
    FirmwareInventory/BIOS"]}'
  • "Targets":["/redfish/v1/
    UpdateService/
    FirmwareInventory/CIMC"]}'

4.3(5.240021)​

CSCwn19002

In Cisco UCS C245 M8 servers, uncorrectable errors that are displayed in Cisco IMC fault logs are non-fatal errors. These errors are displayed during hot plugging of 15.3 TB U.2 P5316 NVMe drives in hybrid slots. These errors have been moved under warnings.

This issue is seen in the Web UI and CLI interfaces.

There is no workaround.

These errors are SEL warnings and can be ignored as they do not have any functional impact.

4.3(5.250001)

CSCwn36143

In Cisco UCS C225 M8 servers, errors are displayed during hot plugging of the NVMe drives.

There is no workaround.

These errors are SEL warnings and can be ignored as they do not have any functional impact.

4.3(5.240021)​

CSCwo02722

On Cisco UCS C240 M7 servers, the firmware upgrade for UCSC-GPU-FLEX170 fails while upgrading to firmware version DG02_1.3274-7.0.0.0, which is equivalent to HUU 4.3.6.250039 or later releases.

This issue occurs when the current running firmware version of UCSC-GPU-FLEX170 is DG02_1.3260-6.4.0.0 or DG02_1.3260-6.7.0.0

Upgrade the UCSC-GPU-FLEX170 to an intermediate firmware version DG02_1.3271-6.8.0.0, which is equivalent to HUU 4.3(4.24xxxx) or 4.3(5.2xxxxx) release level.

4.3(6.250039)

4.3(6.250040)

CSCwo68248

In Cisco UCS C220M7 and C240 M7 servers running HUU 4.3(3.240xxx) level firmware and having 2 PCIe VICs and 1 MLOM VIC, while upgrading the server firmware to HUU 4.3(4.xxxxxx) or 4.3(5.xxxxxx) or 4.3(6.xxxxx) or later level using Redfish API interface, the UCSUpdate task reports a false update failure for the PCIe VIC(riser1) through which CiscoCard mode is cofigured. However, the firmware is updated and activated successfully in the background.

There is no workaround. Ignore the false failure update.

4.3.4.240152

  • Issue

    While configuring IPv6 in Cisco IMC Web UI, if you choose MAC Address, then PXE boot takes precedence over HTTP boot.

Security Fixes in Release 4.3.6

Security Fixes in Release 4.3(6.250101)

Defect ID - CSCwq36167

Cisco UCS C-Series M6 Rack Servers include an Intel CPU that is affected by the vulnerability identified by the following Common Vulnerability and Exposures (CVE) IDs:

  • CVE-2025-20067—Observable timing discrepancy in firmware for some Intel(R) CSME and Intel(R) SPS may allow a privileged user to potentially enable information disclosure via local access.

Defect ID - CSCwq36171

Cisco UCS C-Series M7 Rack Servers include an Intel CPU that is affected by the vulnerability identified by the following Common Vulnerability and Exposures (CVE) IDs:

  • CVE-2025-21096—Improper buffer restrictions in the firmware for some Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2025-20053—Improper buffer restrictions for some Intel(R) Xeon(R) Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2025-24305—Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged user to potentially enable escalation of privilege via local access.

  • CVE-2025-20613—Predictable Seed in Pseudo-Random Number Generator (PRNG) in the firmware for some Intel(R) TDX may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2025-21090—Missing reference to active allocated resource for some Intel(R) Xeon(R) processors may allow an authenticated user to potentially enable denial of service via local access.

  • CVE-2025-22853—Improper synchronization in the firmware for some Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access.

Security Fixes in Release 4.3(6.250053)

Defect ID - CSCwo49706

Cisco UCS M6 servers are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

  • CVE-2024-45332—Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure through local access.

Defect ID - CSCwo49711

Cisco UCS M7 servers are affected by vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs:

  • CVE-2025-20103—Insufficient resource pool in the core management mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service through local access.

  • CVE-2025-20054—Uncaught exception in the core management mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service through local access.

  • CVE-2024-45332—Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution in the indirect branch predictors for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure through local access.

Related Documentation

For configuration information for this release, refer to the following:

For information about installation of the C-Series servers, refer to the following:

The following related documentation is available for the Cisco Unified Computing System:

Refer to the release notes for Cisco UCS Manager software and the Cisco UCS C Series Server Integration with Cisco UCS Manager Guide at the following locations:

Open source documents are same for both the firmware versions 4.3.6.250039 and 4.3.6.250040.