Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Cisco IMC Vulnerability Attackers to Access Internal Services with Elevated Privileges

Posted on June 5, 2025June 5, 2025 By CWS

A major vulnerability in Cisco’s Built-in Administration Controller (IMC) that permits malicious actors to realize elevated privileges and entry inner providers with out correct authorization. 

This vulnerability poses substantial dangers to enterprise networks counting on Cisco’s server administration infrastructure, doubtlessly enabling attackers to compromise important methods and delicate knowledge.

Cisco IMC Privilege Escalation Flaw

The Cisco IMC vulnerability (CVE-2025-20261), categorised as a privilege escalation flaw, exploits weaknesses within the authentication and authorization mechanisms throughout the administration controller’s net interface. 

Attackers can leverage improper enter validation and inadequate entry controls to bypass safety restrictions and execute instructions with administrative privileges. 

The vulnerability impacts the RESTful API endpoints used for system configuration and monitoring, permitting unauthorized customers to control server settings and entry restricted functionalities.

Technical evaluation reveals that the exploit targets the /redfish/v1/ API endpoints, the place inadequate session validation permits attackers to escalate their privileges by means of crafted HTTP requests. 

The vulnerability manifests when the IMC fails to correctly validate consumer credentials towards role-based entry management (RBAC) insurance policies, significantly in eventualities involving JSON Net Token (JWT) manipulation and session hijacking strategies.

The exploitation of this vulnerability can have far-reaching penalties for organizations utilizing affected Cisco IMC methods. 

Attackers gaining elevated privileges can entry the Baseboard Administration Controller (BMC) functionalities, enabling them to change BIOS settings, entry out-of-band administration interfaces, and doubtlessly set up persistent firmware-level malware. 

This stage of entry bypasses conventional safety controls and may present attackers with a foothold for lateral motion throughout the community infrastructure.

The vulnerability significantly threatens knowledge heart environments the place Cisco UCS (Unified Computing System) servers are deployed. 

Attackers exploiting this flaw can entry the Cisco Built-in Administration Controller’s IPMI (Clever Platform Administration Interface) features, permitting them to observe system well being, entry digital media providers, and doubtlessly intercept delicate knowledge transmitted by means of the administration community. 

Danger FactorsDetailsAffected ProductsCisco Built-in Administration Controller (IMC)(together with Cisco UCS C-Collection and Cisco UCS S-Collection)ImpactRemote attackers to realize elevated (admin) privilegesExploit Conditions– Community entry to the IMC administration interface- No prior authentication required (will be exploited remotely underneath particular configurations)CVSS 3.1 Score9.8 (Vital)

Mitigation Methods

Organizations using affected Cisco IMC methods ought to instantly implement complete safety measures to mitigate the dangers related to this vulnerability. 

Major mitigation includes updating to the newest firmware variations that handle the authentication bypass and privilege escalation flaws.

Community directors ought to configure correct community segmentation to isolate administration interfaces from manufacturing networks and implement multi-factor authentication (MFA) for all administrative entry.

Extra safety hardening measures embody disabling pointless providers on the IMC interface, implementing strict firewall guidelines to limit entry to TCP ports 80, 443, and 623 (used for IPMI over LAN), and recurrently auditing consumer accounts with administrative privileges. 

Organizations also needs to monitor for suspicious actions of their Safety Data and Occasion Administration (SIEM) methods, significantly specializing in uncommon API calls to /api/ endpoints and unauthorized entry makes an attempt to the web-based administration interface.

Pace up and enrich menace investigations with Risk Intelligence Lookup! -> 50 trial search requests

Cyber Security News Tags:Access, Attackers, Cisco, Elevated, IMC, Internal, Privileges, Services, Vulnerability

Post navigation

Previous Post: Popular Chrome Extensions Leak API Keys, User Data via HTTP and Hardcoded Credentials
Next Post: New Eleven11bot Hacked 86,000 IP Cameras for Massive DDoS Attack

Related Posts

Windows Remote Desktop Vulnerability Let Attackers Execute Malicious Code Over Network Cyber Security News
Android Security Update – Patch for Vulnerabilities that Allows Privilege Escalation Cyber Security News
Microsoft Teams To Block Screen Capture During Meetings Cyber Security News
Aembit Expands Workload IAM to Microsoft Ecosystem, Enhancing Hybrid Security for Non-Human Identities Cyber Security News
Achieving Data Privacy Regulation Compliance in 2025 Frameworks Cyber Security News
Splunk Enterprise XSS Vulnerability Let Attackers Execute Unauthorized JavaScript Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers
  • Hackers Using New ClickFix Technique To Exploits Human Error Via Fake Prompts
  • Hundreds of GitHub Malware Repos Targeting Novice Cybercriminals Linked to Single User
  • How to Avoid QR Code Scams
  • New ClickFix Attack Exploits Fake Cloudflare Human Check to Install Malware Silently

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News