Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-5944
Received
More InfoOfficial Page
Source-2ffdacf6-8681-47df-b023-4f11abd61c1d
View Known Exploited Vulnerability (KEV) details
Published At-28 Apr, 2026 | 14:16
Updated At-28 Apr, 2026 | 14:16

An improper access control vulnerability exists in the Cisco Intersight Device Connector for Nutanix Prism Central. The service exposes an API passthrough endpoint on TCP port 7373 that is accessible within the network scope of the deployment environment without authentication. An unauthenticated attacker with network access can exploit this vulnerability by sending crafted requests to the exposed endpoint to enumerate cluster metadata, including virtual machine information and cluster configuration details. While the API primarily supports read-only operations, it also allows certain cluster maintenance workflows to be invoked. Although this vulnerability does not allow persistent modification of system configurations or access to credentials or sensitive user data, successful exploitation may result in disruption of active workloads, leading to loss of service availability within the affected environment.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.06.7MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:C/RE:L/U:Amber
Secondary3.18.2HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
Secondary2.08.5HIGH
AV:N/AC:L/Au:N/C:P/I:N/A:C
Type: Secondary
Version: 4.0
Base score: 6.7
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:C/RE:L/U:Amber
Type: Secondary
Version: 3.1
Base score: 8.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
Type: Secondary
Version: 2.0
Base score: 8.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:C
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-306Secondary2ffdacf6-8681-47df-b023-4f11abd61c1d
CWE-862Secondary2ffdacf6-8681-47df-b023-4f11abd61c1d
CWE ID: CWE-306
Type: Secondary
Source: 2ffdacf6-8681-47df-b023-4f11abd61c1d
CWE ID: CWE-862
Type: Secondary
Source: 2ffdacf6-8681-47df-b023-4f11abd61c1d
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://download.nutanix.com/alerts/Security_Advisory_0046.pdf2ffdacf6-8681-47df-b023-4f11abd61c1d
N/A
https://portal.nutanix.com/page/documents/list?type=software&filterKey=software&filterVal=Prism2ffdacf6-8681-47df-b023-4f11abd61c1d
N/A
https://www.nutanix.com/support2ffdacf6-8681-47df-b023-4f11abd61c1d
N/A
Hyperlink: https://download.nutanix.com/alerts/Security_Advisory_0046.pdf
Source: 2ffdacf6-8681-47df-b023-4f11abd61c1d
Resource: N/A
Hyperlink: https://portal.nutanix.com/page/documents/list?type=software&filterKey=software&filterVal=Prism
Source: 2ffdacf6-8681-47df-b023-4f11abd61c1d
Resource: N/A
Hyperlink: https://www.nutanix.com/support
Source: 2ffdacf6-8681-47df-b023-4f11abd61c1d
Resource: N/A
Change History
0Changes found

Details not found