{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T15:00:26.305","vulnerabilities":[{"cve":{"id":"CVE-2026-0689","sourceIdentifier":"1c053176-eef3-4d6a-ae0b-24728c86587b","published":"2026-03-02T16:16:23.653","lastModified":"2026-03-02T20:29:29.330","vulnStatus":"Awaiting Analysis","cveTags":[],"descriptions":[{"lang":"en","value":"In ExtremeCloud IQ – Site Engine (XIQ‑SE) before 26.2.10, a vulnerability in the NAC administration interface allows an authenticated NAC administrator to retrieve masked sensitive parameters from HTTP responses. Although credentials appear redacted in the user interface, the application returns the underlying credential values in the HTTP response, enabling an authorized administrator to recover stored secrets that may exceed their intended access.\n\n\n\n\nWe would like to thank the Lockheed Martin Red Team for responsibly reporting this issue and working with us through coordinated disclosure."},{"lang":"es","value":"En ExtremeCloud IQ – Site Engine (XIQ?SE) anterior a la versión 26.2.10, una vulnerabilidad en la interfaz de administración de NAC permite a un administrador de NAC autenticado recuperar parámetros sensibles enmascarados de las respuestas HTTP. Aunque las credenciales aparecen redactadas en la interfaz de usuario, la aplicación devuelve los valores de credenciales subyacentes en la respuesta HTTP, lo que permite a un administrador autorizado recuperar secretos almacenados que pueden exceder su acceso previsto.\n\nNos gustaría agradecer al Equipo Rojo de Lockheed Martin por informar responsablemente sobre este problema y trabajar con nosotros a través de una divulgación coordinada."}],"metrics":{"cvssMetricV40":[{"source":"1c053176-eef3-4d6a-ae0b-24728c86587b","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":6.0,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"UNREPORTED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}]},"weaknesses":[{"source":"1c053176-eef3-4d6a-ae0b-24728c86587b","type":"Secondary","description":[{"lang":"en","value":"CWE-522"}]}],"references":[{"url":"https://extreme-networks.my.site.com/ExtrArticleDetail?an=000134325","source":"1c053176-eef3-4d6a-ae0b-24728c86587b"}]}}]}