// For flags

CVE-2023-29245

SQL Injection on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0

Severity Score

9.2
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, may allow an unauthenticated attacker to execute arbitrary SQL statements on the DBMS used by the web application by sending specially crafted malicious network packets.

Malicious users with extensive knowledge on the underlying system may be able to extract arbitrary information from the DBMS in an uncontrolled way, or to alter its structure and data.

Una vulnerabilidad de inyección SQL en Nozomi Networks Guardian y CMC, debido a una validación de entrada incorrecta en ciertos campos utilizados en la funcionalidad Asset Intelligence de nuestro IDS, puede permitir que un atacante no autenticado ejecute sentencias SQL arbitrarias en el DBMS utilizado por la aplicación web mediante el envío especial paquetes de red maliciosos manipulados. Los usuarios maliciosos con amplios conocimientos sobre el sistema subyacente pueden extraer información arbitraria del DBMS de forma incontrolada o alterar su estructura y datos.

A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, may allow an unauthenticated attacker to execute arbitrary SQL statements on the DBMS used by the web application by sending specially crafted malicious network packets.

Malicious users with extensive knowledge on the underlying system may be able to extract arbitrary information from the DBMS in an uncontrolled way, alter its structure and data, and/or affect its availability.

*Credits: This issue was found by Nozomi Networks during an internal investigation.
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Attack Requirements
Present
Privileges Required
None
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
High
None
Integrity
High
None
Availability
High
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-06-12 CVE Reserved
  • 2023-09-19 CVE Published
  • 2024-09-20 CVE Updated
  • 2024-10-21 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
  • CAPEC-66: SQL Injection
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Nozominetworks
Search vendor "Nozominetworks"
Cmc
Search vendor "Nozominetworks" for product "Cmc"
>= 22.6.0 < 22.6.3
Search vendor "Nozominetworks" for product "Cmc" and version " >= 22.6.0 < 22.6.3"
-
Affected
Nozominetworks
Search vendor "Nozominetworks"
Cmc
Search vendor "Nozominetworks" for product "Cmc"
>= 23.0.0 < 23.1.0
Search vendor "Nozominetworks" for product "Cmc" and version " >= 23.0.0 < 23.1.0"
-
Affected
Nozominetworks
Search vendor "Nozominetworks"
Guardian
Search vendor "Nozominetworks" for product "Guardian"
>= 22.6.0 < 22.6.3
Search vendor "Nozominetworks" for product "Guardian" and version " >= 22.6.0 < 22.6.3"
-
Affected
Nozominetworks
Search vendor "Nozominetworks"
Guardian
Search vendor "Nozominetworks" for product "Guardian"
>= 23.0.0 < 23.1.0
Search vendor "Nozominetworks" for product "Guardian" and version " >= 23.0.0 < 23.1.0"
-
Affected