Cisco Integrated Management Controller Virtual Keyboard Video Monitor Stored XSS (cisco-sa-ucs-kvmsxss-6h7AnUyk)

medium Nessus Plugin ID 261468

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, Cisco Integrated Management Controller Virtual Keyboard Video Monitor Stored Cross-Site Scripting is affected by a vulnerability.

- A vulnerability in the Virtual Keyboard Video Monitor (vKVM) connection handling of Cisco Integrated Management Controller (IMC) could allow an authenticated, remote attacker with low privileges to conduct a stored cross-site scripting (XSS) attack against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into a specific data field in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid user credentials with privileges that allow for vKVM access on the affected device. Note: The affected vKVM client is also included in Cisco UCS Manager.
(CVE-2025-20342)

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwm57433, CSCwn43958, CSCwo77420, CSCwq34766

See Also

http://www.nessus.org/u?34adfb75

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwm57433

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwn43958

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwo77420

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwq34766

Plugin Details

Severity: Medium

ID: 261468

File Name: cisco-sa-ucs-kvmsxss-6h7AnUyk.nasl

Version: 1.1

Type: combined

Family: CISCO

Published: 9/5/2025

Updated: 9/5/2025

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N

CVSS Score Source: CVE-2025-20342

CVSS v3

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:integrated_management_controller

Required KB Items: Settings/ParanoidReport, Host/Cisco/CIMC/version, Host/Cisco/CIMC/model

Exploit Ease: No known exploits are available

Patch Publication Date: 8/27/2025

Vulnerability Publication Date: 8/27/2025

Reference Information

CVE: CVE-2025-20342

CWE: 80

CISCO-SA: cisco-sa-ucs-kvmsxss-6h7AnUyk

IAVA: 2025-A-0640

CISCO-BUG-ID: CSCwm57433, CSCwn43958, CSCwo77420, CSCwq34766