Vulnerabilities > Nozominetworks > High

DATE CVE VULNERABILITY TITLE RISK
2024-01-15 CVE-2023-5253 Missing Authentication for Critical Function vulnerability in Nozominetworks CMC and Guardian
A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication. Malicious unauthenticated users with knowledge on the underlying system may be able to extract limited asset information.
network
low complexity
nozominetworks CWE-306
7.5
2023-09-19 CVE-2023-29245 SQL Injection vulnerability in Nozominetworks CMC and Guardian
A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, may allow an unauthenticated attacker to execute arbitrary SQL statements on the DBMS used by the web application by sending specially crafted malicious network packets. Malicious users with extensive knowledge on the underlying system may be able to extract arbitrary information from the DBMS in an uncontrolled way, alter its structure and data, and/or affect its availability.
network
high complexity
nozominetworks CWE-89
7.4
2023-09-19 CVE-2023-2567 SQL Injection vulnerability in Nozominetworks CMC and Guardian
A SQL Injection vulnerability has been found in Nozomi Networks Guardian and CMC, due to improper input validation in certain parameters used in the Query functionality. Authenticated users may be able to execute arbitrary SQL statements on the DBMS used by the web application.
network
low complexity
nozominetworks CWE-89
8.8
2023-09-19 CVE-2023-32649 Improper Input Validation vulnerability in Nozominetworks CMC and Guardian
A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets. During the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed.
network
low complexity
nozominetworks CWE-20
7.5
2023-08-09 CVE-2023-23574 SQL Injection vulnerability in Nozominetworks CMC and Guardian
A blind SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in the alerts_count component, allows an authenticated attacker to execute arbitrary SQL statements on the DBMS used by the web application. Authenticated users may be able to extract arbitrary information from the DBMS in an uncontrolled way, alter its structure and data, and/or affect its availability.
network
low complexity
nozominetworks CWE-89
8.8
2023-08-09 CVE-2023-24477 Session Fixation vulnerability in Nozominetworks CMC and Guardian
In certain conditions, depending on timing and the usage of the Chrome web browser, Guardian/CMC versions before 22.6.2 do not always completely invalidate the user session upon logout.
local
high complexity
nozominetworks CWE-384
7.0
2023-05-04 CVE-2022-4259 SQL Injection vulnerability in Nozominetworks CMC and Guardian
Due to improper input validation in the Alerts controller, a SQL injection vulnerability in Nozomi Networks Guardian and CMC allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application.
network
low complexity
nozominetworks CWE-89
8.8
2022-03-24 CVE-2022-0550 Improper Input Validation vulnerability in Nozominetworks CMC and Guardian
Improper Input Validation vulnerability in custom report logo upload in Nozomi Networks Guardian, and CMC allows an authenticated attacker with admin or report manager roles to execute unattended commands on the appliance using web server user privileges.
network
low complexity
nozominetworks CWE-20
7.2
2022-03-24 CVE-2022-0551 Improper Input Validation vulnerability in Nozominetworks CMC and Guardian
Improper Input Validation vulnerability in project file upload in Nozomi Networks Guardian and CMC allows an authenticated attacker with admin or import manager roles to execute unattended commands on the appliance using web server user privileges.
network
low complexity
nozominetworks CWE-20
7.2
2021-02-22 CVE-2021-26724 OS Command Injection vulnerability in Nozominetworks Central Management Control and Guardian
OS Command Injection vulnerability when changing date settings or hostname using web GUI of Nozomi Networks Guardian and CMC allows authenticated administrators to perform remote code execution.
network
low complexity
nozominetworks CWE-78
7.2