| CVE | CVE-2026-44001 | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Title | Session bootstrap token bypass in Nimbus Gateway administrative API | ||||||||||||||||||||||||||||||||||||
| Case Number | VAPT-2026-04401 | ||||||||||||||||||||||||||||||||||||
| Status | Published | ||||||||||||||||||||||||||||||||||||
| Credits |
| ||||||||||||||||||||||||||||||||||||
| Affected products |
| ||||||||||||||||||||||||||||||||||||
| CVSS |
| ||||||||||||||||||||||||||||||||||||
| References |
| ||||||||||||||||||||||||||||||||||||
| Problem type(s) |
| ||||||||||||||||||||||||||||||||||||
| Date published | Apr 10, 2026 | ||||||||||||||||||||||||||||||||||||
| Last modified | Apr 10, 2026, 13:43 UTC | ||||||||||||||||||||||||||||||||||||
Description
A bootstrap token issued during appliance initialization remained valid after the setup workflow completed. The administrative API failed to bind the token to the initialization state, so a replayed request restored a privileged setup session and exposed management actions intended only for first-run use.
Known Detection Rules
Invalidate all bootstrap material after successful onboarding, rotate exposed secrets, and upgrade to Nimbus Gateway 4.2.9 or later. Administrators should review management logs for repeated setup-session requests originating after appliance enrollment.
No authenticated YARA, Sigma, or KQL detection content is attached to this CVE.
References
Public VAPT advisory linked to this CVE.
Public vendor advisory or acknowledgment linked to this CVE.