CVE-2023-24477
📋 TL;DR
This vulnerability allows an authenticated local attacker to potentially access another user's session after logout in Guardian/CMC software. The issue occurs under specific timing conditions when using Chrome browser. Organizations running affected Guardian/CMC versions are at risk.
💻 Affected Systems
- Guardian/CMC
📦 What is this software?
Cmc by Nozominetworks
Guardian by Nozominetworks
⚠️ Risk & Real-World Impact
Worst Case
An authenticated attacker could gain unauthorized access to sensitive administrative functions and data belonging to other users, potentially leading to privilege escalation and data compromise.
Likely Case
Local authenticated users could access sessions of recently logged-out users, potentially viewing or modifying restricted information within the application.
If Mitigated
With proper session management controls and timely patching, the risk is limited to authenticated users exploiting specific timing conditions.
🎯 Exploit Status
Exploitation requires authenticated access and specific timing conditions with Chrome browser
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 22.6.2
Vendor Advisory: https://security.nozominetworks.com/NN-2023:8-01
Restart Required: Yes
Instructions:
1. Download Guardian/CMC version 22.6.2 or later from official vendor sources. 2. Backup current configuration. 3. Install the update following vendor documentation. 4. Restart the service/application.
🔧 Temporary Workarounds
Use alternative browsers
allSwitch from Chrome to alternative browsers (Firefox, Edge, Safari) to avoid the specific timing conditions
Enforce session timeout
allConfigure shorter session timeout periods to reduce window of opportunity
🧯 If You Can't Patch
- Restrict Chrome browser usage on affected systems
- Implement additional authentication layers and monitor for unusual session activity
🔍 How to Verify
Check if Vulnerable:
Check Guardian/CMC version in administration interface or via vendor-provided version check command
Check Version:
Check application administration panel or consult vendor documentation for version verification
Verify Fix Applied:
Verify version is 22.6.2 or later and test logout functionality with Chrome browser
📡 Detection & Monitoring
Log Indicators:
- Multiple sessions from same user ID in short timeframe
- Session creation immediately after logout events
Network Indicators:
- Unusual session reuse patterns
- Multiple authentication requests from same source
SIEM Query:
source="guardian_logs" AND (event="session_create" OR event="logout") | stats count by user, src_ip | where count > 2