Vulnerabilities > Nozominetworks > Guardian > 19.0.4
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-01-15 | CVE-2023-5253 | Missing Authentication for Critical Function vulnerability in Nozominetworks CMC and Guardian A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication. Malicious unauthenticated users with knowledge on the underlying system may be able to extract asset information. | 7.5 |
2023-08-09 | CVE-2023-23903 | Unspecified vulnerability in Nozominetworks CMC and Guardian An authenticated administrator can upload a SAML configuration file with the wrong format, with the application not checking the correct file format. | 4.9 |
2023-08-09 | CVE-2023-24015 | Unspecified vulnerability in Nozominetworks CMC and Guardian A partial DoS vulnerability has been detected in the Reports section, exploitable by a malicious authenticated user forcing a report to be saved with its name set as null. The reports section will be partially unavailable for all later attempts to use it, with the report list seemingly stuck on loading. | 4.3 |
2023-08-09 | CVE-2023-22378 | SQL Injection vulnerability in Nozominetworks CMC and Guardian A blind SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in the sorting parameter, allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application. Authenticated users can extract arbitrary information from the DBMS in an uncontrolled way. | 6.5 |
2023-08-09 | CVE-2023-22843 | Cross-site Scripting vulnerability in Nozominetworks CMC and Guardian An authenticated attacker with administrative access to the appliance can inject malicious JavaScript code inside the definition of a Threat Intelligence rule, that will later be executed by another legitimate user viewing the details of such a rule. An attacker may be able to perform unauthorized actions on behalf of legitimate users. | 4.8 |
2023-08-09 | CVE-2023-23574 | SQL Injection vulnerability in Nozominetworks CMC and Guardian A blind SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in the alerts_count component, allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application. Authenticated users can extract arbitrary information from the DBMS in an uncontrolled way. | 6.5 |
2023-08-09 | CVE-2023-24471 | Incorrect Authorization vulnerability in Nozominetworks CMC and Guardian An access control vulnerability was found, due to the restrictions that are applied on actual assertions not being enforced in their debug functionality. An authenticated user with reduced visibility can obtain unauthorized information via the debug functionality, obtaining data that would normally be not accessible in the Query and Assertions functions. | 6.5 |
2023-08-09 | CVE-2023-24477 | Session Fixation vulnerability in Nozominetworks CMC and Guardian In certain conditions, depending on timing and the usage of the Chrome web browser, Guardian/CMC versions before 22.6.2 do not always completely invalidate the user session upon logout. | 7.0 |
2023-05-04 | CVE-2022-4259 | SQL Injection vulnerability in Nozominetworks CMC and Guardian Due to improper input validation in the Alerts controller, a SQL injection vulnerability in Nozomi Networks Guardian and CMC allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application. | 8.8 |
2022-03-24 | CVE-2022-0550 | Improper Input Validation vulnerability in Nozominetworks CMC and Guardian Improper Input Validation vulnerability in custom report logo upload in Nozomi Networks Guardian, and CMC allows an authenticated attacker with admin or report manager roles to execute unattended commands on the appliance using web server user privileges. | 6.5 |