Impact
The Cisco Intersight Device Connector for Nutanix Prism Central contains an improper access control flaw that exposes a passthrough API on TCP port 7373 without authentication. This weakness allows an attacker who can reach the internal network to send crafted requests that enumerate cluster metadata—including virtual machine lists and configuration details—and, in some cases, invoke maintenance workflows. While the API is largely read‑only and does not provide credentials or persistent configuration changes, the information disclosure and the ability to trigger maintenance operations can lead to disruption of active workloads and loss of availability.
Affected Systems
All Nutanix Prism Central installations that include the Cisco Intersight Device Connector for Prism Central and are running a version older than 7.5.1 are vulnerable. The connector is typically deployed on Prism Central nodes and exposes the endpoint on port 7373 to the internal network.
Risk and Exploitability
The vulnerability has a CVSS score of 6.7 and is not listed in the CISA KEV catalog. The EPSS score is not available, but the exploitation potential exists for any host with network reachability to the internal cluster. An attacker does not require privileged credentials; simply having internal network access suffices to exercise the unauthenticated endpoint.
OpenCVE Enrichment