6.5

CVE-2026-20042

Medienbericht

Cisco Nexus Dashboard Configuration REST API Unauthorized Access Vulnerability

A vulnerability in the configuration backup feature of Cisco Nexus Dashboard could allow an attacker who has the encryption password and access to Full or Config-only backup files to access sensitive information.

This vulnerability exists because authentication details are included in the encrypted backup files. An attacker with a valid backup file and encryption password from an affected device could decrypt the backup file. The attacker could then use the authentication details in the backup file to access internal-only APIs on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerCisco
Produkt Cisco Nexus Dashboard
Default Statusunknown
Version 1.1(3e)
Status affected
Version 1.1(3c)
Status affected
Version 1.1(3d)
Status affected
Version 1.1(0d)
Status affected
Version 1.1(2i)
Status affected
Version 2.0(1b)
Status affected
Version 1.1(2h)
Status affected
Version 1.1(0c)
Status affected
Version 1.1(3f)
Status affected
Version 2.1(1d)
Status affected
Version 2.1(1e)
Status affected
Version 2.0(2g)
Status affected
Version 2.0(2h)
Status affected
Version 2.1(2d)
Status affected
Version 2.0(1d)
Status affected
Version 2.2(1h)
Status affected
Version 2.2(1e)
Status affected
Version 2.2(2d)
Status affected
Version 2.1(2f)
Status affected
Version 2.3(1c)
Status affected
Version 2.3(2b)
Status affected
Version 2.3(2c)
Status affected
Version 2.3(2d)
Status affected
Version 2.3(2e)
Status affected
Version 3.0(1f)
Status affected
Version 3.0(1i)
Status affected
Version 3.1(1k)
Status affected
Version 3.1(1l)
Status affected
Version 3.2(1e)
Status affected
Version 3.2(1i)
Status affected
Version 3.3(1a)
Status affected
Version 3.3(1b)
Status affected
Version 3.3(2b)
Status affected
Version 4.0(1i)
Status affected
Version 3.3(2g)
Status affected
Version 3.2(2f)
Status affected
Version 3.2(2g)
Status affected
Version 3.2(2m)
Status affected
Version 3.1(1n)
Status affected
Version 4.1(1g)
Status affected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.087
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
psirt@cisco.com 6.5 1.2 5.2
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
CWE-295 Improper Certificate Validation

The product does not validate, or incorrectly validates, a certificate.