Advisory ID | NN-2023:2-01 |
---|---|
Topic | Authenticated Blind SQL Injection on sorting in Guardian/CMC before 22.6.2 |
CWE Impact | CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
Issue date | 2023-08-09 |
Affects | Guardian, CMC < v22.6.2 |
CVE Name(s) | CVE-2023-22378 |
CVSS Details | CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVSS Score | 8.7 (CVSS v4.0) 8.8 (CVSS v3.1) |
CVE Risk Level | High (CVSS v4.0) High (CVSS v3.1) |
Risk Level for Nozomi customers | Medium |
A blind SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in the sorting parameter, allows an authenticated attacker to execute arbitrary SQL statements on the DBMS used by the web application.
Authenticated users may be able to extract arbitrary information from the DBMS in an uncontrolled way, alter its structure and data, and/or affect its availability.
Guardian, CMC < v22.6.2
Use internal firewall features to limit access to the web management interface.
Upgrade to v22.6.2 or later.
We thank the following parties for their efforts: