CRITICAL Vulnerability

CVE-2026-44001

Session bootstrap token bypass in Nimbus Gateway administrative API

Nimbus Gateway accepted stale bootstrap session material on the administrative API, allowing remote attackers to regain privileged access without re-authentication.

CVECVE-2026-44001
TitleSession bootstrap token bypass in Nimbus Gateway administrative API
Case NumberVAPT-2026-04401
Status
Published
Credits
Affected products
ProductAffectedUnaffectedUnknown
Nimbus Networks Nimbus GatewayNimbus Gateway 4.2.0 through 4.2.8Unknown
CVSS
Base score9.4 - CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
Attack ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
ScopeUNCHANGED
Confidentiality ImpactHIGH
Integrity ImpactHIGH
Availability ImpactHIGH
References
Problem type(s)
CWE / Problem TypeMITRE TacticsMITRE Techniques
  • Initial Access (TA0001)
  • Credential Access (TA0006)
  • Valid Accounts (T1078)
  • Exploit Public-Facing Application (T1190)
Date publishedApr 10, 2026
Last modifiedApr 10, 2026, 13:43 UTC

Description

A bootstrap token issued during appliance initialization remained valid after the setup workflow completed. The administrative API failed to bind the token to the initialization state, so a replayed request restored a privileged setup session and exposed management actions intended only for first-run use.

Known Detection Rules

Invalidate all bootstrap material after successful onboarding, rotate exposed secrets, and upgrade to Nimbus Gateway 4.2.9 or later. Administrators should review management logs for repeated setup-session requests originating after appliance enrollment.

No authenticated YARA, Sigma, or KQL detection content is attached to this CVE.

References

VAPT writeup

Public VAPT advisory linked to this CVE.

VAPT advisory
Vendor advisory

Public vendor advisory or acknowledgment linked to this CVE.

Vendor advisory