Description
A vulnerability in the configuration backup feature of Cisco Nexus Dashboard could allow an attacker who has the encryption password and access to Full or Config-only backup files to access sensitive information.

This vulnerability exists because authentication details are included in the encrypted backup files. An attacker with a valid backup file and encryption password from an affected device could decrypt the backup file. The attacker could then use the authentication details in the backup file to access internal-only APIs on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user.
Published: 2026-04-01
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability allows an attacker who has both the encryption password and access to backup files to decrypt the configuration backup. Once decrypted, the attacker can extract authentication credentials stored in the backup file, use them to access internal-only APIs, and ultimately execute arbitrary commands as the root user of the device.

Affected Systems

Cisco Nexus Dashboard is affected by this flaw. No specific version information is supplied, so all installations of the product should be considered potentially vulnerable.

Risk and Exploitability

The vulnerability has a CVSS score of 6.5, indicating a medium to high severity. The EPSS score is not available, and it is not listed in the CISA KEV catalog. An attacker must obtain the encryption password and a valid backup file, then use those credentials to decrypt the backup and perform the malicious actions. Exploitation likely requires either local access to backups or the ability to obtain the backup files through other means. The attack vector appears to be indirect, relying on compromised backup file access rather than a direct remote service attack.

Generated by OpenCVE AI on April 2, 2026 at 02:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify all backup files for embedded authentication credentials and remove them if possible.
  • Control access to backup files and encryption passwords so that only trusted administrators can retrieve them.
  • Implement firewall rules or network segmentation to restrict access to internal-only APIs from untrusted hosts.
  • Apply any Cisco patches or updates that remove the vulnerability once available.
  • Monitor system logs for unusual API activity or command execution events.

Generated by OpenCVE AI on April 2, 2026 at 02:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco nexus Dashboard
Vendors & Products Cisco
Cisco nexus Dashboard

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the configuration backup feature of Cisco Nexus Dashboard could allow an attacker who has the encryption password and access to Full or Config-only backup files to access sensitive information. This vulnerability exists because authentication details are included in the encrypted backup files. An attacker with a valid backup file and encryption password from an affected device could decrypt the backup file. The attacker could then use the authentication details in the backup file to access internal-only APIs on the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system as the root user.
Title Cisco Nexus Dashboard Configuration REST API Unauthorized Access Vulnerability
Weaknesses CWE-295
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cisco Nexus Dashboard
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-04-02T03:56:08.575Z

Reserved: 2025-10-08T11:59:15.354Z

Link: CVE-2026-20042

cve-icon Vulnrichment

Updated: 2026-04-01T18:12:46.925Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-01T17:28:26.173

Modified: 2026-04-03T16:11:11.357

Link: CVE-2026-20042

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T08:58:37Z

Weaknesses