Advisory ID | NN-2022:2-02 |
---|---|
Topic | Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 |
CWE Impact | CWE-20: Improper Input Validation |
Issue date | 2022-02-14 |
Affects | Guardian, CMC < v22.0.0 |
CVE Name(s) | CVE-2022-0551 |
CVSS Details | CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVSS Score | 8.6 (CVSS v4.0) 7.2 (CVSS v3.1) |
CVE Risk Level | High (CVSS v4.0) High (CVSS v3.1) |
Risk Level for Nozomi customers | Medium |
Improper Input Validation vulnerability in project file upload in Nozomi Networks Guardian and CMC allows an authenticated attacker with admin or import manager roles to execute unattended commands on the appliance using web server user privileges.
Users with admin or import manager roles can upload project configuration files to add more details on asset data inside Nozomi Networks Guardian and CMC. However, an improper validation is performed on the project file, allowing the users to execute commands remotely on the appliance, leveraging the privileges of the webserver.
Guardian, CMC < v22.0.0
Use internal firewall features to limit management interface access and review users allowed to import project data files.
Upgrade to v22.0.0.
We thank the following parties for their efforts: