Nutanix AOS : Multiple Vulnerabilities (NXSA-AOS-7.5.1.1)

medium Nessus Plugin ID 305049

Synopsis

The Nutanix AOS host is affected by multiple vulnerabilities .

Description

The version of AOS installed on the remote host is prior to 7.5.1.1. It is, therefore, affected by multiple vulnerabilities as referenced in the NXSA-AOS-7.5.1.1 advisory.

- The email module, specifically the BytesGenerator class, didn't properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized. This is only applicable if using LiteralHeader writing headers that don't respect email folding rules, the new behavior will reject the incorrectly folded headers in BytesGenerator. (CVE-2026-1299)

- Apache CXF stores large stream based messages as temporary files on the local filesystem. A bug was introduced which means that the entire temporary file is read into memory and then logged. An attacker might be able to exploit this to cause a denial of service attack by causing an out of memory exception.
In addition, it is possible to configure CXF to encrypt temporary files to prevent sensitive credentials from being cached unencrypted on the local filesystem, however this bug means that the cached files are written out to logs unencrypted. Users are recommended to upgrade to versions 3.5.11, 3.6.6, 4.0.7 or 4.1.1, which fixes this issue. (CVE-2025-48795)

- The imaplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters. (CVE-2025-15366)

- The poplib module, when passed a user-controlled command, can have additional commands injected using newlines. Mitigation rejects commands containing control characters. (CVE-2025-15367)

- User-controlled header names and values containing newlines can allow injecting HTTP headers.
(CVE-2026-0865)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the Nutanix AOS software to the recommended version. Before upgrading: if this cluster is registered with Prism Central, ensure that Prism Central has been upgraded first to a compatible version. Refer to the Software Product Interoperability page on the Nutanix portal.

See Also

http://www.nessus.org/u?76942860

Plugin Details

Severity: Medium

ID: 305049

File Name: nutanix_NXSA-AOS-7_5_1_1.nasl

Version: 1.1

Type: Local

Family: Misc.

Published: 4/6/2026

Updated: 4/6/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.0

CVSS v2

Risk Factor: High

Base Score: 8.5

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:C/A:N

CVSS Score Source: CVE-2026-1299

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2025-48795

CVSS v4

Risk Factor: Medium

Base Score: 6

Threat Score: 2.3

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N

Vulnerability Information

CPE: cpe:/o:nutanix:aos

Required KB Items: Host/Nutanix/Data/lts, Host/Nutanix/Data/Service, Host/Nutanix/Data/Version, Host/Nutanix/Data/arch

Exploit Ease: No known exploits are available

Patch Publication Date: 4/6/2026

Vulnerability Publication Date: 7/15/2025

Reference Information

CVE: CVE-2025-15366, CVE-2025-15367, CVE-2025-48795, CVE-2026-0865, CVE-2026-1299