Cisco Intersight Device Connector for Nutanix Prism Central Unauthenticated API Access
An improper access control vulnerability exists in the Cisco Intersight Device Connector for Nutanix Prism Central. The service exposes an API passthrough endpoint on TCP port 7373 that is accessible within the network scope of the deployment environment without authentication.
An unauthenticated attacker with network access can exploit this vulnerability by sending crafted requests to the exposed endpoint to enumerate cluster metadata, including virtual machine information and cluster configuration details. While the API primarily supports read-only operations, it also allows certain cluster maintenance workflows to be invoked.
Although this vulnerability does not allow persistent modification of system configurations or access to credentials or sensitive user data, successful exploitation may result in disruption of active workloads, leading to loss of service availability within the affected environment.
Problem Types
| Type | CWE ID | Description |
|---|
| CWE | CWE-306 | CWE-306 Missing authentication for critical function |
| CWE | CWE-862 | CWE-862 Missing Authorization |
Type: CWE
Description: CWE-306 Missing authentication for critical function
Type: CWE
Description: CWE-862 Missing Authorization
Metrics
| Version | Base score | Base severity | Vector |
|---|
| 4.0 | 6.7 | MEDIUM | CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/S:N/AU:N/R:U/V:C/RE:L/U:Amber |
| 3.1 | 8.2 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H |
| 2.0 | 8.5 | N/A | AV:N/AC:L/Au:N/C:P/I:N/A:C |
Version: 4.0
Base score: 6.7
Base severity: MEDIUM
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/S:N/AU:N/R:U/V:C/RE:L/U:Amber
Version: 3.1
Base score: 8.2
Base severity: HIGH
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
Version: 2.0
Base score: 8.5
Base severity: N/A
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:C
Impacts
| CAPEC ID | Description |
|---|
| CAPEC-115 | CAPEC-115 Authentication Bypass |
Description: CAPEC-115 Authentication Bypass
Timeline
| Event | Date |
|---|
| Initial vulnerability analysis and internal update | 2026-04-08 15:45:00 |
| CVE reserved | 2026-04-08 18:30:00 |
| Advisory published | 2026-04-28 13:06:00 |
Event: Initial vulnerability analysis and internal update
Date: 2026-04-08 15:45:00
Event: CVE reserved
Date: 2026-04-08 18:30:00
Event: Advisory published
Date: 2026-04-28 13:06:00