A vulnerability in the Virtual Keyboard Video Monitor (vKVM) connection handling of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to redirect a user to a malicious website.
This vulnerability is due to insufficient verification of vKVM endpoints. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to redirect a user to a malicious webpage and potentially capture user credentials.
Note: The affected vKVM client is also included in Cisco UCS Manager.
CVSS v3.1 (7.1)
AV NETWORK · AC LOW · PR NONE · UI REQUIRED · S UNCHANGED
Vendor
Cisco, Cisco, Cisco
Product
Cisco Unified Computing System (Managed), Cisco Unified Computing System (Standalone), Cisco Unified Computing System E-Series Software (UCSE)
High potential impact if exploited, but there is no public exploitation or PoC reported; the open redirect could lead to credential theft via user interaction.
Why this matters
The vulnerability enables an unauthenticated attacker to redirect users to a malicious site during a vKVM session, potentially harvesting credentials. In Cisco UCS environments, that credential exposure could grant access to management surfaces or subsequent footholds, increasing risk to sensitive infrastructure.
Most likely attack path
Attacker can exploit over the network with no privileges required; user interaction is needed.
User is lured to click a crafted link, triggering a redirect to an attacker-controlled site.
If credentials are entered during the redirected session, secrets may be exfiltrated; limited to the initial scope of the affected vKVM/IMC client.
Who is most exposed
Sites with vKVM access to Cisco UCS Manager or UCS E-Series/Standalone deployments, especially where remote management consoles are exposed to users or assistants via email or chat.
Detection ideas
Monitor for anomalous redirects from vKVM endpoints to untrusted domains following user clicks.
Correlate user login events with sudden redirects or 302 responses to external hosts.
Inspect vKVM session logs for unexpected external redirects or URL patterns.
Alert on credential submissions to non-corporate domains during management sessions.
Look for unusual DNS lookups or outbound traffic to new domains during active KVM sessions.
Mitigation and prioritisation
Apply vendor patch or upgrade to supported, fixed versions as soon as available.
Where patching is not feasible, disable or restrict vKVM redirects to trusted networks; implement stricter access controls and MFA for management interfaces.
Enforce endpoint- and network-level protections against open redirects (proxy/WAF rules, URL validation).
Schedule change windows and verify rollback procedures; document compensating controls.
EPSS not provided; KEV not indicated; therefore not treating as priority 1 unless new exploitation signals emerge.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below