
Cloud Vulnerability DB
A community-led vulnerabilities database
An Improper Input Validation vulnerability (CVE-2022-0550) was discovered in Nozomi Networks Guardian and CMC's custom report logo upload functionality. The vulnerability affects versions prior to 22.0.0 of both products and was disclosed on February 14, 2022. The issue allows authenticated users with admin or report manager roles to execute unattended commands on the appliance using web server user privileges (Nozomi Advisory).
The vulnerability is classified as CWE-20 (Improper Input Validation) and received a CVSS v4.0 score of 8.6 (High) and CVSS v3.1 score of 7.2 (High). The vulnerability exists in the custom report logo upload functionality where insufficient input validation is performed on uploaded images. The attack vector is network-accessible (AV:N) with low attack complexity (AC:L) but requires high privileges (PR:H) and no user interaction (UI:N) (NVD Database, Nozomi Advisory).
When exploited, the vulnerability allows attackers with admin or report manager roles to execute remote commands on the affected appliance with web server user privileges. This could lead to unauthorized command execution and potential system compromise (Nozomi Advisory).
Nozomi Networks has released version 22.0.0 which addresses this vulnerability. As a temporary workaround, organizations are advised to use internal firewall features to limit management interface access and review users allowed to manage reports. The recommended permanent solution is to upgrade to version 22.0.0 or later (Nozomi Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."