NN-2020:2-01
Vulnerability from csaf_nozominetworks
Published
2020-05-26 11:00
Modified
2024-05-20 11:00
Summary
Cross-site request forgery attack on change password form
Notes
Risk Level for Nozomi customers
Medium
{ document: { aggregate_severity: { text: "HIGH", }, category: "csaf_vex", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", }, }, lang: "en-US", notes: [ { category: "other", text: "Medium", title: "Risk Level for Nozomi customers", }, ], publisher: { category: "vendor", contact_details: "Nozomi Networks Product Security team can be reached at prodsec@nozominetworks.com", name: "Nozomi Networks Product Security", namespace: "https://security.nozominetworks.com/psirt", }, title: "Cross-site request forgery attack on change password form", tracking: { current_release_date: "2024-05-20T11:00:00.000Z", id: "NN-2020:2-01", initial_release_date: "2020-05-26T11:00:00.000Z", revision_history: [ { date: "2020-05-26T11:00:00.000Z", number: "1", summary: "Initial revision", }, { date: "2023-09-04T11:00:00.000Z", number: "2", summary: "Minor updates to format and metadata to improve the CSAF implementation", }, { date: "2023-11-13T11:00:00.000Z", number: "3", summary: "Migrated to CSAF VEX format", }, { date: "2023-11-16T11:00:00.000Z", number: "4", summary: "CSAF vers improvements", }, { date: "2024-05-20T11:00:00.000Z", number: "5", summary: "Added CVSS v4.0 scoring where applicable", }, ], status: "final", version: "5", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version_range", name: "vers:gem/>=19.0.4|<19.0.11", product: { name: "Nozomi Networks Guardian >=19.0.4|<19.0.11", product_id: "CSAFPID-0001", }, }, { category: "product_version_range", name: "vers:gem/>=20.0.0|<20.0.3", product: { name: "Nozomi Networks Guardian >=20.0.0|<20.0.3", product_id: "CSAFPID-0002", }, }, { category: "product_version", name: "19.0.11", product: { name: "Nozomi Networks Guardian 19.0.11", product_id: "CSAFPID-0003", }, }, { category: "product_version", name: "20.0.3", product: { name: "Nozomi Networks Guardian 20.0.3", product_id: "CSAFPID-0004", }, }, ], category: "product_name", name: "Guardian", }, { branches: [ { category: "product_version_range", name: "vers:gem/>=19.0.4|<19.0.11", product: { name: "Nozomi Networks CMC >=19.0.4|<19.0.11", product_id: "CSAFPID-0005", }, }, { category: "product_version_range", name: "vers:gem/>=20.0.0|<20.0.3", product: { name: "Nozomi Networks CMC >=20.0.0|<20.0.3", product_id: "CSAFPID-0006", }, }, { category: "product_version", name: "19.0.11", product: { name: "Nozomi Networks CMC 19.0.11", product_id: "CSAFPID-0007", }, }, { category: "product_version", name: "20.0.3", product: { name: "Nozomi Networks CMC 20.0.3", product_id: "CSAFPID-0008", }, }, ], category: "product_name", name: "CMC", }, ], category: "vendor", name: "Nozomi Networks", }, ], }, vulnerabilities: [ { acknowledgments: [ { organization: "Schneider Electric Industry Services", summary: "finding this bug", }, ], cwe: { id: "CWE-352", name: "Cross-Site Request Forgery (CSRF)", }, discovery_date: "2020-05-26T11:00:00.000Z", ids: [ { system_name: "Nozomi Networks Security Advisory ID", text: "NN-2020:2-01", }, ], notes: [ { category: "summary", text: "Change password doesn't validate CSRF token properly.", title: "Vulnerability summary", }, ], product_status: { fixed: [ "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0007", "CSAFPID-0008", ], known_affected: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0005", "CSAFPID-0006", ], }, remediations: [ { category: "mitigation", details: "Users should always pay attention to phishing emails and un-trusted links.", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0005", "CSAFPID-0006", ], }, { category: "vendor_fix", details: "v19 series: Upgrade to v19.0.11 v20 series: Upgrade to v20.0.3", product_ids: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0005", "CSAFPID-0006", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0005", "CSAFPID-0006", ], }, ], threats: [ { category: "impact", details: "An attacker can force the victim to change password without knowing. To successfully complete this attack the victim needs to be logged to the Guardian/CMC and visit a special prepared page containing the forged change password request. The change password request will be logged to the internal Guardian/CMC audit log and the victim session will be terminated. The attacked must have Guardian/CMC reachability to login into the system after a successful attack. Guardian/CMC starting from v19.0.4 are affected, versions before v19.0.4 are NOT affected.", }, ], title: "Cross-site request forgery attack on change password form", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.