Authenticated command path traversal on timezone settings in Guardian/CMC before

Last update: 2021-02-22

Advisory IDNN-2021:2-01
TopicAuthenticated command path traversal on timezone settings in Guardian/CMC before
CWE ImpactCWE-24: Path Traversal: '../filedir'
Issue date2021-02-04
AffectsGuardian, CMC <v20.0.7.4 or <v19.0.12
CVE Name(s)CVE-2021-26725
CVSS detailsCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS Score7.2
CVE Risk LevelHigh
Risk Level for Nozomi customersLow


An authenticated command path traversal vulnerability in the management interface allows an authenticated administrator to read-protected system files.


Authenticated web GUI administrator can force the system to copy system files to the wrong location allowing him to read the contents. However, as by design web GUI administrators are allowed to use ssh keys to gain full console access, this finding has a low impact on our customers.

Affected Products

Guardian, CMC <v20.0.7.4 or <v19.0.12

Workarounds and Mitigations

Use internal firewall feature to limit management interface access and review user roles.


v19 series: Upgrade to v19.0.12. v20 series: Upgrade to v20.0.7.4.

Modification History

2021-02-22: Initial revision

Related Links


This bug was found by Erik de Jong


Nozomi Networks Product Security team can be reached at prodsec@nozominetworks.com.
More contact details on the PSIRT page.