CVE-2023-29245

8.1 HIGH

📋 TL;DR

An unauthenticated SQL injection vulnerability in Nozomi Networks Guardian and CMC allows attackers to execute arbitrary SQL commands via specially crafted network packets targeting the Asset Intelligence functionality. This could lead to data theft, database manipulation, or service disruption. Organizations using vulnerable versions of these products are affected.

💻 Affected Systems

Products:
  • Nozomi Networks Guardian
  • Nozomi Networks CMC
Versions: Specific versions not provided in reference; consult vendor advisory
Operating Systems: Not specified - likely appliance-based
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in Asset Intelligence functionality of IDS; all deployments using affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the database including data exfiltration, structural alteration, and denial of service, potentially leading to full system compromise.

🟠

Likely Case

Unauthorized data extraction from the database, potentially exposing sensitive asset intelligence information.

🟢

If Mitigated

Limited impact with proper network segmentation and input validation controls in place.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation possible via network packets.
🏢 Internal Only: HIGH - Even internal attackers can exploit without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires knowledge of underlying system and crafting malicious network packets.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Consult vendor advisory NN-2023:11-01 for specific patched versions

Vendor Advisory: https://security.nozominetworks.com/NN-2023:11-01

Restart Required: Yes

Instructions:

1. Review vendor advisory NN-2023:11-01
2. Identify current version
3. Apply vendor-provided patches/updates
4. Restart affected services

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Nozomi devices to trusted sources only

Configure firewall rules to limit inbound connections to Nozomi devices

Input Validation Enhancement

all

Implement additional input validation at network perimeter

Deploy WAF with SQL injection rules
Configure IDS/IPS to detect SQL injection patterns

🧯 If You Can't Patch

  • Isolate Nozomi devices in separate network segment with strict access controls
  • Implement network monitoring for SQL injection patterns targeting Nozomi systems

🔍 How to Verify

Check if Vulnerable:

Check current version against vendor advisory; test with authorized vulnerability scanning

Check Version:

Check via Nozomi web interface or CLI (vendor-specific command)

Verify Fix Applied:

Verify version matches patched release from vendor advisory; test with authorized vulnerability scanning

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed login attempts or unusual access patterns

Network Indicators:

  • Malformed network packets targeting Asset Intelligence endpoints
  • SQL injection patterns in traffic to Nozomi devices

SIEM Query:

source="nozomi" AND (event_type="sql_error" OR message="SQL" OR pattern="UNION SELECT")

🔗 References

📤 Share & Export