Cisco Nexus Dashboard Server Side Request Forgery Vulnerability
Summary
| CVE | CVE-2026-20041 |
|---|---|
| State | PUBLISHED |
| Assigner | cisco |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-01 17:28:25 UTC |
| Updated | 2026-04-01 17:28:25 UTC |
| Description | A vulnerability in Cisco Nexus Dashboard and Cisco Nexus Dashboard Insights could allow an unauthenticated, remote attacker to conduct a server-side request forgery (SSRF) attack through an affected device. This vulnerability is due to improper input validation for specific HTTP requests. An attacker could exploit this vulnerability by persuading an authenticated user of the device management interface to click a crafted link. A successful exploit could allow the attacker to send arbitrary network requests that are sourced from the affected device to an attacker-controlled server. The attacker could then execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. |
Risk And Classification
Primary CVSS: v3.1 6.1 MEDIUM from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Problem Types: CWE-918 | CWE-918 Server-Side Request Forgery (SSRF)
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 6.1 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
| 3.1 | CNA | CVSSV3_1 | 6.1 | MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
RequiredScope
ChangedConfidentiality
LowIntegrity
LowAvailability
NoneCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Cisco | Cisco Nexus Dashboard | affected 1.1(3e) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 1.1(3c) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 1.1(3d) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 1.1(0d) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 1.1(2i) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 2.0(1b) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 1.1(2h) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 1.1(0c) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 1.1(3f) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 2.1(1d) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 2.1(1e) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 2.0(2g) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 2.0(2h) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 2.1(2d) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 2.0(1d) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 2.2(1h) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 2.2(1e) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 2.2(2d) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 2.1(2f) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 2.3(1c) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 2.3(2b) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 2.3(2c) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 2.3(2d) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 2.3(2e) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 3.0(1f) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 3.0(1i) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 3.1(1k) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 3.1(1l) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 3.2(1e) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 3.2(1i) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 3.3(1a) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 3.3(1b) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 3.3(2b) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 4.0(1i) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 3.3(2g) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 3.2(2f) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 3.2(2g) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 3.2(2m) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 3.1(1n) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard | affected 4.1(1g) | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard Insights | affected 2.2.2.125 | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard Insights | affected 2.2.2.126 | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard Insights | affected 5.0.1.150 | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard Insights | affected 5.0.1.154 | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard Insights | affected 5.1.0.131 | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard Insights | affected 5.1.0.135 | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard Insights | affected 6.0.1 | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard Insights | affected 6.0.2 | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard Insights | affected 6.1.1 | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard Insights | affected 6.1.2 | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard Insights | affected 6.1.3 | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard Insights | affected 6.2.1 | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard Insights | affected 6.2.2 | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard Insights | affected 6.3.1 | Not specified |
| CNA | Cisco | Cisco Nexus Dashboard Insights | affected 6.4.1 | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nd-ssr... | [email protected] | sec.cloudapps.cisco.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Additional Advisory Data
Exploits
CNA: The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
There are currently no legacy QID mappings associated with this CVE.