CVE-2024-13089
Authenticated RCE in update functionality in Guardian/CMC before 24.6.0
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
An OS command injection vulnerability within the update functionality may allow an authenticated administrator to execute unauthorized arbitrary OS commands. Users with administrative privileges may upload update packages to upgrade the versions of Nozomi Networks Guardian and CMC. While these updates are signed and their signatures are validated prior to installation, an improper signature validation check has been identified. This issue could potentially enable users to execute commands remotely on the appliance, thereby impacting confidentiality, integrity, and availability.
Una vulnerabilidad de inyección de comandos del sistema operativo en la funcionalidad de actualización podría permitir que un administrador autenticado ejecute comandos arbitrarios del sistema operativo no autorizados. Los usuarios con privilegios administrativos podrían cargar paquetes de actualización para actualizar las versiones de Nozomi Networks Guardian y CMC. Si bien estas actualizaciones están firmadas y sus firmas se validan antes de la instalación, se ha identificado una comprobación incorrecta de la validación de firmas. Este problema podría permitir que los usuarios ejecuten comandos de forma remota en el dispositivo, lo que afectaría la confidencialidad, la integridad y la disponibilidad.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-12-31 CVE Reserved
- 2025-06-10 CVE Published
- 2025-06-10 CVE Updated
- 2025-07-31 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
- CAPEC-88: OS Command Injection
References (1)
URL | Tag | Source |
---|---|---|
https://security.nozominetworks.com/NN-2025:1-01 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Nozomi Networks Search vendor "Nozomi Networks" | Guardian Search vendor "Nozomi Networks" for product "Guardian" | < 24.6.0 Search vendor "Nozomi Networks" for product "Guardian" and version " < 24.6.0" | en |
Affected
| ||||||
Nozomi Networks Search vendor "Nozomi Networks" | CMC Search vendor "Nozomi Networks" for product "CMC" | < 24.6.0 Search vendor "Nozomi Networks" for product "CMC" and version " < 24.6.0" | en |
Affected
|