// For flags

CVE-2024-13089

Authenticated RCE in update functionality in Guardian/CMC before 24.6.0

Severity Score

7.5
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

An OS command injection vulnerability within the update functionality may allow an authenticated administrator to execute unauthorized arbitrary OS commands. Users with administrative privileges may upload update packages to upgrade the versions of Nozomi Networks Guardian and CMC. While these updates are signed and their signatures are validated prior to installation, an improper signature validation check has been identified. This issue could potentially enable users to execute commands remotely on the appliance, thereby impacting confidentiality, integrity, and availability.

Una vulnerabilidad de inyección de comandos del sistema operativo en la funcionalidad de actualización podría permitir que un administrador autenticado ejecute comandos arbitrarios del sistema operativo no autorizados. Los usuarios con privilegios administrativos podrían cargar paquetes de actualización para actualizar las versiones de Nozomi Networks Guardian y CMC. Si bien estas actualizaciones están firmadas y sus firmas se validan antes de la instalación, se ha identificado una comprobación incorrecta de la validación de firmas. Este problema podría permitir que los usuarios ejecuten comandos de forma remota en el dispositivo, lo que afectaría la confidencialidad, la integridad y la disponibilidad.

*Credits: IOActive found this issue during a VAPT testing session commissioned by one of our customers.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
Present
Privileges Required
High
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
High
None
Integrity
High
None
Availability
High
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Multiple
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
None
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-12-31 CVE Reserved
  • 2025-06-10 CVE Published
  • 2025-06-10 CVE Updated
  • 2025-07-31 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
  • CAPEC-88: OS Command Injection
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Nozomi Networks
Search vendor "Nozomi Networks"
Guardian
Search vendor "Nozomi Networks" for product "Guardian"
< 24.6.0
Search vendor "Nozomi Networks" for product "Guardian" and version " < 24.6.0"
en
Affected
Nozomi Networks
Search vendor "Nozomi Networks"
CMC
Search vendor "Nozomi Networks" for product "CMC"
< 24.6.0
Search vendor "Nozomi Networks" for product "CMC" and version " < 24.6.0"
en
Affected