Cisco released essential security patches to fix two command injection weaknesses found in its UCS Manager Software, which are impacting some fabric interconnect platforms such as 6300 Series, 6400 Series, 6500 Series, and X-Series Direct Fabric Interconnect 9108. These weaknesses had been made publicly available on August 27, 2025, and are affecting both the command-line interface as well as the web-based management interface. Attacker groups having administrative access might use those weaknesses in order to perform arbitrary commands, which can grant root-level access and make a system vulnerable. These weaknesses found are a serious threat for confidentiality and integrity of information in those environments where UCS Manager is in use. Both weaknesses are caused by a lack of proper input validation, namely not sanitizing user-supplied parameters for commands. Both CVE-2025-20294 and CVE-2025-20295 enable injection over both CLI and web portal but only for the CLI respectively; both allow for high-impact file operations such as reading or overwriting system files. Even though exploiting is only needed with administrator credentals, the high level of access combined with privilege escalation possibilities increase its severity. Found internally by Cisco's security team, the bugs illustrate the risks in improper input handling in essential infrastructure management software in very highly interconnected or automated environments. Cisco highly recommends users immediately upgrade to patch-fixed software versions since no workaround is available. UCS Software version 4.2(3p) and 4.3(6c) cover the needed fixes, while version 6.0 is not vulnerable. Organizations should review their current implementations, confirm interoperability, and apply patches within planned maintenance cycles in an effort to reduce vulnerability. Cisco also recommends reviewing official release notes and involving technical support if upgrade paths are unclear. Keeping a current UCS Manager Software is essential for protection against a possible exploitation as well as maintaining security for mission-critical data center operations.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...