NN-2022:2-02

Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0

Last update: 2024-09-19

Advisory IDNN-2022:2-02
TopicAuthenticated RCE on project configuration import in Guardian/CMC before 22.0.0
CWE ImpactCWE-20: Improper Input Validation
Issue date2022-02-14
AffectsGuardian, CMC < v22.0.0
CVE Name(s)CVE-2022-0551
CVSS DetailsCVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS Score8.6 (CVSS v4.0)
7.2 (CVSS v3.1)
CVE Risk LevelHigh (CVSS v4.0)
High (CVSS v3.1)
Risk Level for Nozomi customersMedium

Summary

Improper Input Validation vulnerability in project file upload in Nozomi Networks Guardian and CMC allows an authenticated attacker with admin or import manager roles to execute unattended commands on the appliance using web server user privileges.

Impact

Users with admin or import manager roles can upload project configuration files to add more details on asset data inside Nozomi Networks Guardian and CMC. However, an improper validation is performed on the project file, allowing the users to execute commands remotely on the appliance, leveraging the privileges of the webserver.

Affected Products

Guardian, CMC < v22.0.0

Workarounds and Mitigations

Use internal firewall features to limit management interface access and review users allowed to import project data files.

Solutions

Upgrade to v22.0.0.

Modification History

2022-02-14: Initial revision
2023-09-04: Minor updates to format and metadata to improve the CSAF implementation
2023-11-13: Migrated to CSAF VEX format
2023-11-16: CSAF vers improvements
2024-05-20: Added CVSS v4.0 scoring where applicable
2024-09-19: Revised the CVSS scoring

Related Links

Acknowledgements

We thank the following parties for their efforts:

  • SECURA B.V. for finding this bug during a scheduled VAPT testing session

Contact

Nozomi Networks Product Security team can be reached at prodsec@nozominetworks.com.
More contact details on the PSIRT page.