
CVE-2024-13090 – Privilege escalation in Guardian/CMC before 24.6.0
https://notcve.org/view.php?id=CVE-2024-13090
10 Jun 2025 — A privilege escalation vulnerability may enable a service account to elevate its privileges. The sudo rules configured for a local service account were excessively permissive, potentially allowing administrative access if a malicious actor could execute arbitrary commands as that account. It is important to note that no such vector has been identified in this instance. Una vulnerabilidad de escalada de privilegios podría permitir que una cuenta de servicio eleve sus privilegios. Las reglas de sudo configura... • https://security.nozominetworks.com/NN-2025:2-01 • CWE-250: Execution with Unnecessary Privileges •

CVE-2024-13089 – Authenticated RCE in update functionality in Guardian/CMC before 24.6.0
https://notcve.org/view.php?id=CVE-2024-13089
10 Jun 2025 — An OS command injection vulnerability within the update functionality may allow an authenticated administrator to execute unauthorized arbitrary OS commands. Users with administrative privileges may upload update packages to upgrade the versions of Nozomi Networks Guardian and CMC. While these updates are signed and their signatures are validated prior to installation, an improper signature validation check has been identified. This issue could potentially enable users to execute commands remotely on the ap... • https://security.nozominetworks.com/NN-2025:1-01 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2024-4465 – Incorrect authorization for Reports configuration in Guardian/CMC before 24.2.0
https://notcve.org/view.php?id=CVE-2024-4465
11 Sep 2024 — An access control vulnerability was discovered in the Reports section due to a specific access restriction not being properly enforced for users with limited privileges. If a logged-in user with reporting privileges learns how to create a specific application request, they might be able to make limited changes to the reporting configuration. This could result in a partial loss of data integrity. In Guardian/CMC instances with a reporting configuration, there could be limited Denial of Service (DoS) impacts,... • https://security.nozominetworks.com/NN-2024:2-01 • CWE-863: Incorrect Authorization •

CVE-2023-6916 – Information disclosure via audit records for OpenAPI requests in Guardian/CMC before 23.4.1
https://notcve.org/view.php?id=CVE-2023-6916
10 Apr 2024 — Audit records for OpenAPI requests may include sensitive information. This could lead to unauthorized accesses and privilege escalation. Los registros de auditoría de solicitudes de OpenAPI pueden incluir información confidencial. Esto podría provocar accesos no autorizados y escalada de privilegios. • https://security.nozominetworks.com/NN-2023:17-01 • CWE-201: Insertion of Sensitive Information Into Sent Data CWE-522: Insufficiently Protected Credentials •

CVE-2023-5253 – Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0
https://notcve.org/view.php?id=CVE-2023-5253
15 Jan 2024 — A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication. Malicious unauthenticated users with knowledge on the underlying system may be able to extract asset information. Una verificación de autenticación faltante en el canal WebSocket utilizado para la integración de Check Point IoT en Nozomi Networks Guardian y CMC puede permitir que un atacante n... • https://security.nozominetworks.com/NN-2023:12-01 • CWE-306: Missing Authentication for Critical Function •

CVE-2023-32649 – DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0
https://notcve.org/view.php?id=CVE-2023-32649
19 Sep 2023 — A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets. During the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed. Vulnerabilidad de Denegación de Servicio (Dos) en Nozomi Networks Guardian y CMC, debido a u... • https://security.nozominetworks.com/NN-2023:10-01 • CWE-20: Improper Input Validation CWE-1286: Improper Validation of Syntactic Correctness of Input •

CVE-2023-29245 – SQL Injection on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0
https://notcve.org/view.php?id=CVE-2023-29245
19 Sep 2023 — A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, may allow an unauthenticated attacker to execute arbitrary SQL statements on the DBMS used by the web application by sending specially crafted malicious network packets. Malicious users with extensive knowledge on the underlying system may be able to extract arbitrary information from the DBMS in an uncontrolled way, or to alter its st... • https://security.nozominetworks.com/NN-2023:11-01 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-2567 – Authenticated SQL Injection on Query functionality in Guardian/CMC before 22.6.3 and 23.1.0
https://notcve.org/view.php?id=CVE-2023-2567
19 Sep 2023 — A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain parameters used in the Query functionality, allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application. Authenticated users can extract arbitrary information from the DBMS in an uncontrolled way. Vulnerabilidad de inyección SQL en Nozomi Networks Guardian y CMC, debido a una validación de entrada incorrecta en ciertos parámetros utilizados en la funcio... • https://security.nozominetworks.com/NN-2023:9-01 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-23903 – DoS via SAML configuration in Guardian/CMC before 22.6.2
https://notcve.org/view.php?id=CVE-2023-23903
09 Aug 2023 — An authenticated administrator can upload a SAML configuration file with the wrong format, with the application not checking the correct file format. Every subsequent application request will return an error. The whole application in rendered unusable until a console intervention. Un administrador autenticado puede cargar un archivo de configuración SAML con el formato incorrecto, sin que la aplicación compruebe el formato correcto del archivo. Cada solicitud posterior de la aplicación devolverá un error. • https://security.nozominetworks.com/NN-2023:7-01 • CWE-20: Improper Input Validation CWE-1286: Improper Validation of Syntactic Correctness of Input •

CVE-2023-24015 – Partial DoS on Reports section due to null report name in Guardian/CMC before 22.6.2
https://notcve.org/view.php?id=CVE-2023-24015
09 Aug 2023 — A partial DoS vulnerability has been detected in the Reports section, exploitable by a malicious authenticated user forcing a report to be saved with its name set as null. The reports section will be partially unavailable for all later attempts to use it, with the report list seemingly stuck on loading. Se ha detectado una vulnerabilidad de denegación de servicio parcial en la sección Informes, que puede ser explotada por un usuario malicioso ya autenticado que fuerce a guardar un informe con el nombre nulo... • https://security.nozominetworks.com/NN-2023:6-01 • CWE-20: Improper Input Validation CWE-1286: Improper Validation of Syntactic Correctness of Input •