CVE-2023-23574

8.8 HIGH

📋 TL;DR

This is a blind SQL injection vulnerability in Nozomi Networks Guardian and CMC products that allows authenticated attackers to execute arbitrary SQL statements on the underlying database. Attackers can extract sensitive data, modify database structure and content, or disrupt database availability. Only authenticated users can exploit this vulnerability.

💻 Affected Systems

Products:
  • Nozomi Networks Guardian
  • Nozomi Networks CMC
Versions: Multiple versions prior to the patched release
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web interface; affects the alerts_count component specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the database including exfiltration of all sensitive data, destruction of database integrity, and denial of service affecting the entire Nozomi Networks monitoring system.

🟠

Likely Case

Data exfiltration of sensitive network monitoring information, configuration data, and potentially credential extraction from the database.

🟢

If Mitigated

Limited impact due to proper input validation and database permission restrictions, potentially only allowing data viewing without modification.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but SQL injection techniques are well-documented and tools are readily available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://security.nozominetworks.com/NN-2023:3-01

Restart Required: Yes

Instructions:

1. Review vendor advisory NN-2023:3-01. 2. Download and apply the latest security update from Nozomi Networks. 3. Restart affected services. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Restrict Database Permissions

all

Limit database user permissions to read-only access where possible to prevent data modification.

Network Segmentation

all

Restrict access to Nozomi Networks web interface to only authorized administrators.

🧯 If You Can't Patch

  • Implement strict input validation at the application layer for the alerts_count component
  • Deploy a web application firewall (WAF) with SQL injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check if your Nozomi Networks version is listed as vulnerable in advisory NN-2023:3-01

Check Version:

Check version through Nozomi Networks web interface or consult product documentation

Verify Fix Applied:

Verify the installed version matches or exceeds the patched version specified in the vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed authentication attempts followed by successful login
  • Unusual access patterns to alerts_count endpoint

Network Indicators:

  • Unusual database connection patterns from web application server
  • Large data transfers from database to unexpected destinations

SIEM Query:

SELECT * FROM web_logs WHERE url LIKE '%alerts_count%' AND (params CONTAINS 'UNION' OR params CONTAINS 'SELECT' OR params CONTAINS 'INSERT' OR params CONTAINS 'DELETE')

🔗 References

📤 Share & Export