nn-2020:2-01
Vulnerability from csaf_nozominetworks
Published
2020-05-26 11:00
Modified
2024-05-20 11:00
Summary
Cross-site request forgery attack on change password form

Notes

Risk Level for Nozomi customers
Medium



{
   document: {
      aggregate_severity: {
         text: "HIGH",
      },
      category: "csaf_vex",
      csaf_version: "2.0",
      distribution: {
         tlp: {
            label: "WHITE",
         },
      },
      lang: "en-US",
      notes: [
         {
            category: "other",
            text: "Medium",
            title: "Risk Level for Nozomi customers",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "Nozomi Networks Product Security team can be reached at prodsec@nozominetworks.com",
         name: "Nozomi Networks Product Security",
         namespace: "https://security.nozominetworks.com/psirt",
      },
      title: "Cross-site request forgery attack on change password form",
      tracking: {
         current_release_date: "2024-05-20T11:00:00.000Z",
         id: "NN-2020:2-01",
         initial_release_date: "2020-05-26T11:00:00.000Z",
         revision_history: [
            {
               date: "2020-05-26T11:00:00.000Z",
               number: "1",
               summary: "Initial revision",
            },
            {
               date: "2023-09-04T11:00:00.000Z",
               number: "2",
               summary: "Minor updates to format and metadata to improve the CSAF implementation",
            },
            {
               date: "2023-11-13T11:00:00.000Z",
               number: "3",
               summary: "Migrated to CSAF VEX format",
            },
            {
               date: "2023-11-16T11:00:00.000Z",
               number: "4",
               summary: "CSAF vers improvements",
            },
            {
               date: "2024-05-20T11:00:00.000Z",
               number: "5",
               summary: "Added CVSS v4.0 scoring where applicable",
            },
         ],
         status: "final",
         version: "5",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_version_range",
                        name: "vers:gem/>=19.0.4|<19.0.11",
                        product: {
                           name: "Nozomi Networks Guardian >=19.0.4|<19.0.11",
                           product_id: "CSAFPID-0001",
                        },
                     },
                     {
                        category: "product_version_range",
                        name: "vers:gem/>=20.0.0|<20.0.3",
                        product: {
                           name: "Nozomi Networks Guardian >=20.0.0|<20.0.3",
                           product_id: "CSAFPID-0002",
                        },
                     },
                     {
                        category: "product_version",
                        name: "19.0.11",
                        product: {
                           name: "Nozomi Networks Guardian 19.0.11",
                           product_id: "CSAFPID-0003",
                        },
                     },
                     {
                        category: "product_version",
                        name: "20.0.3",
                        product: {
                           name: "Nozomi Networks Guardian 20.0.3",
                           product_id: "CSAFPID-0004",
                        },
                     },
                  ],
                  category: "product_name",
                  name: "Guardian",
               },
               {
                  branches: [
                     {
                        category: "product_version_range",
                        name: "vers:gem/>=19.0.4|<19.0.11",
                        product: {
                           name: "Nozomi Networks CMC >=19.0.4|<19.0.11",
                           product_id: "CSAFPID-0005",
                        },
                     },
                     {
                        category: "product_version_range",
                        name: "vers:gem/>=20.0.0|<20.0.3",
                        product: {
                           name: "Nozomi Networks CMC >=20.0.0|<20.0.3",
                           product_id: "CSAFPID-0006",
                        },
                     },
                     {
                        category: "product_version",
                        name: "19.0.11",
                        product: {
                           name: "Nozomi Networks CMC 19.0.11",
                           product_id: "CSAFPID-0007",
                        },
                     },
                     {
                        category: "product_version",
                        name: "20.0.3",
                        product: {
                           name: "Nozomi Networks CMC 20.0.3",
                           product_id: "CSAFPID-0008",
                        },
                     },
                  ],
                  category: "product_name",
                  name: "CMC",
               },
            ],
            category: "vendor",
            name: "Nozomi Networks",
         },
      ],
   },
   vulnerabilities: [
      {
         acknowledgments: [
            {
               organization: "Schneider Electric Industry Services",
               summary: "finding this bug",
            },
         ],
         cwe: {
            id: "CWE-352",
            name: "Cross-Site Request Forgery (CSRF)",
         },
         discovery_date: "2020-05-26T11:00:00.000Z",
         ids: [
            {
               system_name: "Nozomi Networks Security Advisory ID",
               text: "NN-2020:2-01",
            },
         ],
         notes: [
            {
               category: "summary",
               text: "Change password doesn't validate CSRF token properly.",
               title: "Vulnerability summary",
            },
         ],
         product_status: {
            fixed: [
               "CSAFPID-0003",
               "CSAFPID-0004",
               "CSAFPID-0007",
               "CSAFPID-0008",
            ],
            known_affected: [
               "CSAFPID-0001",
               "CSAFPID-0002",
               "CSAFPID-0005",
               "CSAFPID-0006",
            ],
         },
         remediations: [
            {
               category: "mitigation",
               details: "Users should always pay attention to phishing emails and un-trusted links.",
               product_ids: [
                  "CSAFPID-0001",
                  "CSAFPID-0002",
                  "CSAFPID-0005",
                  "CSAFPID-0006",
               ],
            },
            {
               category: "vendor_fix",
               details: "v19 series: Upgrade to v19.0.11 v20 series: Upgrade to v20.0.3",
               product_ids: [
                  "CSAFPID-0001",
                  "CSAFPID-0002",
                  "CSAFPID-0005",
                  "CSAFPID-0006",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  baseScore: 8.8,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "CSAFPID-0001",
                  "CSAFPID-0002",
                  "CSAFPID-0005",
                  "CSAFPID-0006",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "An attacker can force the victim to change password without knowing. To successfully complete this attack the victim needs to be logged to the Guardian/CMC and visit a special prepared page containing the forged change password request. The change password request will be logged to the internal Guardian/CMC audit log and the victim session will be terminated. The attacked must have Guardian/CMC reachability to login into the system after a successful attack. Guardian/CMC starting from v19.0.4 are affected, versions before v19.0.4 are NOT affected.",
            },
         ],
         title: "Cross-site request forgery attack on change password form",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.