CVE-2022-0551
Summary
| CVE | CVE-2022-0551 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-03-24 15:15:00 UTC |
| Updated | 2022-03-30 18:11:00 UTC |
| Description | Improper Input Validation vulnerability in project file upload in Nozomi Networks Guardian and CMC allows an authenticated attacker with admin or import manager roles to execute unattended commands on the appliance using web server user privileges. This issue affects: Nozomi Networks Guardian versions prior to 22.0.0. Nozomi Networks CMC versions prior to 22.0.0. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Nozominetworks | Cmc | All | All | All | All |
| Application | Nozominetworks | Guardian | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| NN-2022:2-02 - Authenticated RCE on project configuration import in Guardian/CMC before 22.0.0 - CVE-2022-0551 | Product Security Incident Response Portal | CONFIRM | security.nozominetworks.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: SECURA B.V. found this bug during a scheduled VAPT testing session.
There are currently no legacy QID mappings associated with this CVE.