This vulnerability is presently awaiting analysis.
A SQL Injection vulnerability successful Nozomi Networks Guardian and CMC, owed to improper input validation successful definite fields utilized successful the Asset Intelligence functionality of our IDS, whitethorn let an unauthenticated attacker to execute arbitrary SQL statements connected the DBMS utilized by the web exertion by sending specially crafted malicious web packets.
Malicious users with extended cognition connected the underlying strategy whitethorn beryllium capable to extract arbitrary accusation from the DBMS successful an uncontrolled way, oregon to change its operation and data.
CVSS 3.x Severity and Metrics:
not yet provided.
CNA: Nozomi Networks Inc.
References to Advisories, Solutions, and Tools
By selecting these links, you volition beryllium leaving NIST webspace.
We person provided these links to different web sites due to the fact that they
may person accusation that would beryllium of involvement to you. No
inferences should beryllium drawn connected relationship of different sites being
referenced, oregon not, from this page. There whitethorn beryllium different web
sites that are much due for your purpose. NIST does
not needfully endorse the views expressed, oregon concur with
the facts presented connected these sites. Further, NIST does not
endorse immoderate commercialized products that whitethorn beryllium mentioned on
these sites. Please code comments astir this leafage to [email protected].
||Improper Neutralization of Special Elements utilized successful an SQL Command ('SQL Injection')
Nozomi Networks Inc.
0 alteration records recovered show changes