// For flags

CVE-2022-0550

Authenticated RCE on logo report upload in Guardian/CMC before 22.0.0

Severity Score

5.3
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Improper Input Validation vulnerability in custom report logo upload in Nozomi Networks Guardian, and CMC allows an authenticated attacker with admin or report manager roles to execute unattended commands on the appliance using web server user privileges. This issue affects: Nozomi Networks Guardian versions prior to 22.0.0. Nozomi Networks CMC versions prior to 22.0.0.

Una vulnerabilidad de comprobaciĆ³n de entrada inapropiada en la carga de logotipos de informes personalizados en Nozomi Networks Guardian y CMC permite a un atacante autenticado con funciones de administrador o administrador de informes ejecutar comandos desatendidos en el dispositivo usando privilegios de usuario del servidor web. Este problema afecta a: Nozomi Networks Guardian versiones anteriores a 22.0.0. Nozomi Networks CMC versiones anteriores a 22.0.0

*Credits: SECURA B.V. found this bug during a scheduled VAPT testing session.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
Low
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
Low
None
Integrity
Low
None
Availability
Low
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-02-09 CVE Reserved
  • 2022-03-24 CVE Published
  • 2023-10-15 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
  • CAPEC-88: OS Command Injection
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Nozominetworks
Search vendor "Nozominetworks"
Cmc
Search vendor "Nozominetworks" for product "Cmc"
< 22.0.0
Search vendor "Nozominetworks" for product "Cmc" and version " < 22.0.0"
-
Affected
Nozominetworks
Search vendor "Nozominetworks"
Guardian
Search vendor "Nozominetworks" for product "Guardian"
< 22.0.0
Search vendor "Nozominetworks" for product "Guardian" and version " < 22.0.0"
-
Affected