EUVD-2024-54660

| CVE-2024-13089 HIGH
2025-06-10 [email protected]
7.2
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 19:49 euvd
EUVD-2024-54660
Analysis Generated
Mar 14, 2026 - 19:49 vuln.today
CVE Published
Jun 10, 2025 - 11:15 nvd
HIGH 7.2

Description

An OS command injection vulnerability within the update functionality may allow an authenticated administrator to execute unauthorized arbitrary OS commands. Users with administrative privileges may upload update packages to upgrade the versions of Nozomi Networks Guardian and CMC. While these updates are signed and their signatures are validated prior to installation, an improper signature validation check has been identified. This issue could potentially enable users to execute commands remotely on the appliance, thereby impacting confidentiality, integrity, and availability.

Analysis

CVE-2024-13089 is an OS command injection vulnerability in the update functionality of Nozomi Networks Guardian and CMC appliances that allows authenticated administrators to bypass signature validation and execute arbitrary OS commands. While the vulnerability requires high-privilege administrative access, the improper cryptographic signature validation on update packages creates a critical integrity bypass that could lead to complete system compromise. The attack is network-accessible with no user interaction required once an administrator initiates an update.

Technical Context

The vulnerability exists in the update package processing mechanism of Nozomi Networks Guardian and CMC products (CPE identifiers: cpe:2.3:a:nozominetworks:guardian:* and cpe:2.3:a:nozominetworks:cmc:*). The root cause is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command) combined with an improper cryptographic signature validation weakness (CWE-347). Administrators can upload digitally signed update packages; however, the signature validation logic contains a flaw that fails to properly authenticate the package integrity before processing. This allows injection of malicious OS commands within update payloads that are executed with elevated privileges during the update installation process. The vulnerability bypasses intended security controls designed to ensure only legitimate, vendor-signed updates are processed.

Affected Products

Nozomi Networks Guardian (all versions prior to patched release) and Nozomi Networks CMC (all versions prior to patched release). Specific version numbers for patched releases were not provided in the source data and should be obtained from Nozomi Networks' official security advisory. CPE identifiers: cpe:2.3:a:nozominetworks:guardian:* and cpe:2.3:a:nozominetworks:cmc:*. The vulnerability affects deployed appliance instances where administrators have access to the update functionality, with no specific hardware, OS, or configuration exemptions mentioned.

Remediation

Immediate actions: (1) Apply the latest security patches from Nozomi Networks as soon as available—vendor advisory and patch links should be obtained directly from Nozomi Networks' website or security portal. (2) Restrict administrative access to the Guardian and CMC update functionality to a minimal set of trusted personnel; implement multi-factor authentication for administrative accounts if not already in place. (3) Audit recent update activity logs to identify any unauthorized or suspicious update submissions. (4) If immediate patching is not possible, implement network-level controls to restrict access to the update management interface to trusted networks or jump hosts. (5) Monitor for unexpected process execution or command activity on Guardian and CMC appliances post-update. Longer-term: validate that all future updates originate from official Nozomi Networks sources and consider implementing additional integrity verification mechanisms beyond signature validation.

Priority Score

36
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +36
POC: 0

Share

EUVD-2024-54660 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy