Advisory ID | NN-2023:12-01 |
---|---|
Topic | Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0 |
CWE Impact | CWE-306: Missing Authentication for Critical Function |
Issue date | 2024-01-15 |
Affects | Guardian, CMC < v23.3.0 |
CVE Name(s) | CVE-2023-5253 |
CVSS Details | CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
CVSS Score | 6.3 (CVSS v4.0) 5.3 (CVSS v3.1) |
CVE Risk Level | Medium (CVSS v4.0) Medium (CVSS v3.1) |
Risk Level for Nozomi customers | Low |
A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication.
Malicious unauthenticated users with knowledge on the underlying system may be able to extract limited asset information.
Guardian, CMC < v23.3.0
Use internal firewall features to limit access to the web management interface.
Upgrade to v23.3.0 or later.
We thank the following parties for their efforts: