14 results (0.003 seconds)

CVSS: 6.0EPSS: 0%CPEs: 2EXPL: 0

An access control vulnerability was discovered in the Reports section due to a specific access restriction not being properly enforced for users with limited privileges. If a logged-in user with reporting privileges learns how to create a specific application request, they might be able to make limited changes to the reporting configuration. This could result in a partial loss of data integrity. In Guardian/CMC instances with a reporting configuration, there could be limited Denial of Service (DoS) impacts, as the reports may not reach their intended destination, and there could also be limited information disclosure impacts. Furthermore, modifying the destination SMTP server for the reports could lead to the compromise of external credentials, as they might be sent to an unauthorized server. • https://security.nozominetworks.com/NN-2024:2-01 • CWE-863: Incorrect Authorization •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted malformed network packets to cause the IDS module to stop updating nodes, links, and assets. Network traffic may not be analyzed until the IDS module is restarted. Una vulnerabilidad de denegación de servicio (DOS) en Nozomi Networks Guardian, causada por una validación de entrada incorrecta en ciertos campos utilizados en la funcionalidad de análisis Radius de nuestro IDS, permite que un atacante no autenticado envíe paquetes de red mal formados especialmente manipulados para provocar que el módulo IDS deje de actualizar los nodos, enlaces y activos. Es posible que el tráfico de red no se analice hasta que se reinicie el módulo IDS. • https://security.nozominetworks.com/NN-2024:1-01 • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Audit records for OpenAPI requests may include sensitive information. This could lead to unauthorized accesses and privilege escalation. Los registros de auditoría de solicitudes de OpenAPI pueden incluir información confidencial. Esto podría provocar accesos no autorizados y escalada de privilegios. • https://security.nozominetworks.com/NN-2023:17-01 • CWE-522: Insufficiently Protected Credentials •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication. Malicious unauthenticated users with knowledge on the underlying system may be able to extract asset information. Una verificación de autenticación faltante en el canal WebSocket utilizado para la integración de Check Point IoT en Nozomi Networks Guardian y CMC puede permitir que un atacante no autenticado obtenga datos de activos sin autenticación. Los usuarios maliciosos no autenticados con conocimiento sobre el sistema subyacente pueden extraer información de activos. • https://security.nozominetworks.com/NN-2023:12-01 • CWE-306: Missing Authentication for Critical Function •

CVSS: 8.2EPSS: 0%CPEs: 4EXPL: 0

A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets. During the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed. Vulnerabilidad de Denegación de Servicio (Dos) en Nozomi Networks Guardian y CMC, debido a una validación de entrada incorrecta en ciertos campos utilizados en la funcionalidad de inteligencia de activos de nuestro IDS, permite a un atacante no autenticado bloquear el módulo IDS enviando paquetes de red con formato incorrecto especialmente manipulado. Durante el período de tiempo (limitado) antes de que el módulo IDS se reinicie automáticamente, es posible que no se analice el tráfico de red. • https://security.nozominetworks.com/NN-2023:10-01 • CWE-20: Improper Input Validation •