6.5
CVE-2026-20042
- EPSS 0.03%
- Veröffentlicht 01.04.2026 16:27:49
- Zuletzt bearbeitet 03.04.2026 16:11:11
- Quelle psirt@cisco.com
- CVE-Watchlists
- Unerledigt
Cisco Nexus Dashboard Configuration REST API Unauthorized Access Vulnerability
A vulnerability in the configuration backup feature of Cisco Nexus Dashboard could allow an attacker who has the encryption password and access to Full or Config-only backup files to access sensitive information. This vulnerability exists because authentication details are included in the encrypted backup files. An attacker with a valid backup file and encryption password from an affected device could decrypt the backup file. The attacker could then use the authentication details in the backup file to access internal-only APIs on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
≫
Produkt
Cisco Nexus Dashboard
Default Statusunknown
Version
1.1(3e)
Status
affected
Version
1.1(3c)
Status
affected
Version
1.1(3d)
Status
affected
Version
1.1(0d)
Status
affected
Version
1.1(2i)
Status
affected
Version
2.0(1b)
Status
affected
Version
1.1(2h)
Status
affected
Version
1.1(0c)
Status
affected
Version
1.1(3f)
Status
affected
Version
2.1(1d)
Status
affected
Version
2.1(1e)
Status
affected
Version
2.0(2g)
Status
affected
Version
2.0(2h)
Status
affected
Version
2.1(2d)
Status
affected
Version
2.0(1d)
Status
affected
Version
2.2(1h)
Status
affected
Version
2.2(1e)
Status
affected
Version
2.2(2d)
Status
affected
Version
2.1(2f)
Status
affected
Version
2.3(1c)
Status
affected
Version
2.3(2b)
Status
affected
Version
2.3(2c)
Status
affected
Version
2.3(2d)
Status
affected
Version
2.3(2e)
Status
affected
Version
3.0(1f)
Status
affected
Version
3.0(1i)
Status
affected
Version
3.1(1k)
Status
affected
Version
3.1(1l)
Status
affected
Version
3.2(1e)
Status
affected
Version
3.2(1i)
Status
affected
Version
3.3(1a)
Status
affected
Version
3.3(1b)
Status
affected
Version
3.3(2b)
Status
affected
Version
4.0(1i)
Status
affected
Version
3.3(2g)
Status
affected
Version
3.2(2f)
Status
affected
Version
3.2(2g)
Status
affected
Version
3.2(2m)
Status
affected
Version
3.1(1n)
Status
affected
Version
4.1(1g)
Status
affected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.087 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@cisco.com | 6.5 | 1.2 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
|
CWE-295 Improper Certificate Validation
The product does not validate, or incorrectly validates, a certificate.