Advisory ID | NN-2022:2-01 |
---|---|
Topic | Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0 |
Impact | CWE-20: Improper Input Validation |
Issue date | 2022-02-14 |
Affects | Guardian and CMC with N2OS <v22.0.0 |
CVE Name(s) | CVE-2022-0550 |
CVSS details | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
CVSS Score | 6.3 |
CVE Risk Level | Medium |
Risk Level for Nozomi customers | Low |
Improper Input Validation vulnerability in custom report logo upload in Nozomi Networks Guardian and CMC allows an authenticated attacker with admin or report manager roles to execute unattended commands on the appliance using web server user privileges.
Users with admin or report manager roles can upload a custom image to be used as logo in the header of the reports generated by Nozomi Networks Guardian and CMC. However, an improper validation is performed allowing the users to execute command remotly on the appliance, leveraging the privileges of the web server.
Guardian / CMC before v22.0.0.
Use internal firewall features to limit management interface access and review users allowed to manage reports.
Upgrade to v22.0.0.
2022-02-14: Initial revision
SECURA B.V. found this bug during a scheduled VAPT testing session.