Description
An improper access control vulnerability exists in the Cisco Intersight Device Connector for Nutanix Prism Central. The service exposes an API passthrough endpoint on TCP port 7373 that is accessible within the network scope of the deployment environment without authentication.



An unauthenticated attacker with network access can exploit this vulnerability by sending crafted requests to the exposed endpoint to enumerate cluster metadata, including virtual machine information and cluster configuration details. While the API primarily supports read-only operations, it also allows certain cluster maintenance workflows to be invoked.



Although this vulnerability does not allow persistent modification of system configurations or access to credentials or sensitive user data, successful exploitation may result in disruption of active workloads, leading to loss of service availability within the affected environment.
Published: 2026-04-28
Score: 6.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Cisco Intersight Device Connector for Nutanix Prism Central contains an improper access control flaw that exposes a passthrough API on TCP port 7373 without authentication. This weakness allows an attacker who can reach the internal network to send crafted requests that enumerate cluster metadata—including virtual machine lists and configuration details—and, in some cases, invoke maintenance workflows. While the API is largely read‑only and does not provide credentials or persistent configuration changes, the information disclosure and the ability to trigger maintenance operations can lead to disruption of active workloads and loss of availability.

Affected Systems

All Nutanix Prism Central installations that include the Cisco Intersight Device Connector for Prism Central and are running a version older than 7.5.1 are vulnerable. The connector is typically deployed on Prism Central nodes and exposes the endpoint on port 7373 to the internal network.

Risk and Exploitability

The vulnerability has a CVSS score of 6.7 and is not listed in the CISA KEV catalog. The EPSS score is not available, but the exploitation potential exists for any host with network reachability to the internal cluster. An attacker does not require privileged credentials; simply having internal network access suffices to exercise the unauthenticated endpoint.

Generated by OpenCVE AI on April 28, 2026 at 19:18 UTC.

Remediation

Vendor Solution

Nutanix has released version 7.5.1 of the Cisco Intersight Device Connector: * Log in to Prism Central (PC) and navigate to the Life Cycle Manager (LCM) Dashboard. * Click "Perform Inventory" or "Get Full Inventory" to refresh the inventory. * After the inventory refresh completes, navigate to the Marketplace. * Select the Cisco Intersight Device Connector. * Click "Upgrade" to update to version 7.5.1 or later.


Vendor Workaround

If upgrading the Cisco Intersight Device Connector to version 7.5.1 or later is not immediately possible, restrict access to TCP port 7373 by limiting the service to internal traffic only: * Establish an SSH session to Prism Central (PC). * Execute the following command to reconfigure the service visibility to internal traffic only: sudo kubectl -n pc-platform-other annotate service cisco-device-connector service.msp.ntnx.io/lb=pc-internal --overwrite * Run the following command: sudo kubectl get svc -n pc-platform-other and verify that the Cisco Intersight Device Connector is no longer associated with the Prism Central public IP address.


OpenCVE Recommended Actions

  • Upgrade the Cisco Intersight Device Connector to version 7.5.1 or later using Prism Central’s Life Cycle Manager.
  • If an immediate upgrade is not possible, reconfigure the service to restrict TCP port 7373 to internal traffic only by applying the Kubernetes annotation command provided in the advisory.
  • Verify that the service no longer is exposed on the Prism Central public IP address by running the kubectl get svc command.
  • Monitor audit logs for unexpected API activity that could indicate exploitation attempts.

Generated by OpenCVE AI on April 28, 2026 at 19:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 18 May 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco intersight Device Connector
CPEs cpe:2.3:a:cisco:intersight_device_connector:*:*:*:*:*:*:*:*
Vendors & Products Cisco
Cisco intersight Device Connector

Tue, 28 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Description An improper access control vulnerability exists in the Cisco Intersight Device Connector for Nutanix Prism Central. The service exposes an API passthrough endpoint on TCP port 7373 that is accessible within the network scope of the deployment environment without authentication. An unauthenticated attacker with network access can exploit this vulnerability by sending crafted requests to the exposed endpoint to enumerate cluster metadata, including virtual machine information and cluster configuration details. While the API primarily supports read-only operations, it also allows certain cluster maintenance workflows to be invoked. Although this vulnerability does not allow persistent modification of system configurations or access to credentials or sensitive user data, successful exploitation may result in disruption of active workloads, leading to loss of service availability within the affected environment.
Title Cisco Intersight Device Connector for Nutanix Prism Central Unauthenticated API Access
First Time appeared Nutanix
Nutanix cisco Intersight Device Connector For Prism Central
Weaknesses CWE-306
CWE-862
CPEs cpe:2.3:a:nutanix:cisco_intersight_device_connector_for_prism_central:*:*:*:*:*:*:*:*
Vendors & Products Nutanix
Nutanix cisco Intersight Device Connector For Prism Central
References
Metrics cvssV2_0

{'score': 8.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:C'}

cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H'}

cvssV4_0

{'score': 6.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/S:N/AU:N/R:U/V:C/RE:L/U:Amber'}


Subscriptions

Cisco Intersight Device Connector
Nutanix Cisco Intersight Device Connector For Prism Central
cve-icon MITRE

Status: PUBLISHED

Assigner: Nutanix

Published:

Updated: 2026-04-28T14:14:58.850Z

Reserved: 2026-04-09T05:40:22.214Z

Link: CVE-2026-5944

cve-icon Vulnrichment

Updated: 2026-04-28T14:14:53.135Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-28T14:16:13.853

Modified: 2026-05-18T19:44:01.557

Link: CVE-2026-5944

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T10:10:46Z

Weaknesses