cvelist/2022/0xxx/CVE-2022-0551.json

134 lines
4.6 KiB
JSON
Raw Normal View History

2022-02-09 17:01:20 +00:00
{
2024-05-28 11:00:34 +00:00
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
2022-02-09 17:01:20 +00:00
"CVE_data_meta": {
"ID": "CVE-2022-0551",
2024-05-28 11:00:34 +00:00
"ASSIGNER": "prodsec@nozominetworks.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper Input Validation vulnerability in project file upload in Nozomi Networks Guardian and CMC allows an authenticated attacker with admin or import manager roles to execute unattended commands on the appliance using web server user privileges. This issue affects: Nozomi Networks Guardian versions prior to 22.0.0. Nozomi Networks CMC versions prior to 22.0.0."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation",
"cweId": "CWE-20"
}
]
}
]
2022-02-09 17:01:20 +00:00
},
2022-03-24 15:12:22 +01:00
"affects": {
"vendor": {
"vendor_data": [
{
2024-05-28 11:00:34 +00:00
"vendor_name": "Nozomi Networks",
2022-03-24 15:12:22 +01:00
"product": {
"product_data": [
{
"product_name": "Guardian",
"version": {
"version_data": [
{
"version_affected": "<",
2024-05-28 11:00:34 +00:00
"version_name": "unspecified",
2022-03-24 15:12:22 +01:00
"version_value": "22.0.0"
}
]
}
},
{
"product_name": "CMC",
"version": {
"version_data": [
{
"version_affected": "<",
2024-05-28 11:00:34 +00:00
"version_name": "unspecified",
2022-03-24 15:12:22 +01:00
"version_value": "22.0.0"
}
]
}
}
]
2024-05-28 11:00:34 +00:00
}
2022-03-24 15:12:22 +01:00
}
]
}
},
2024-05-28 11:00:34 +00:00
"references": {
"reference_data": [
2022-02-09 17:01:20 +00:00
{
2024-05-28 11:00:34 +00:00
"url": "https://security.nozominetworks.com/NN-2022:2-02",
"refsource": "MISC",
"name": "https://security.nozominetworks.com/NN-2022:2-02"
2022-02-09 17:01:20 +00:00
}
]
2022-03-24 15:12:22 +01:00
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
2024-05-28 11:00:34 +00:00
"source": {
"advisory": "https://security.nozominetworks.com/NN-2022:2-02",
"discovery": "INTERNAL"
2022-03-24 15:12:22 +01:00
},
2024-05-28 11:00:34 +00:00
"work_around": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<p>Use internal firewall features to limit management interface access and review users allowed to import project data files.</p>"
}
],
"value": "Use internal firewall features to limit management interface access and review users allowed to import project data files."
}
],
2022-03-24 15:12:22 +01:00
"solution": [
{
2024-05-28 11:00:34 +00:00
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "<p>Upgrade to v22.0.0.</p>"
}
],
2022-03-24 15:12:22 +01:00
"value": "Upgrade to v22.0.0."
}
],
2024-05-28 11:00:34 +00:00
"credits": [
2022-03-24 15:12:22 +01:00
{
2024-05-28 11:00:34 +00:00
"lang": "en",
"value": "SECURA B.V. found this bug during a scheduled VAPT testing session."
2022-03-24 15:12:22 +01:00
}
2024-05-28 11:00:34 +00:00
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
]
}
2022-02-09 17:01:20 +00:00
}