A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication.



Malicious unauthenticated users with knowledge on the underlying system may be able to extract limited asset information.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-57578 A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication. Malicious unauthenticated users with knowledge on the underlying system may be able to extract limited asset information.
Fixes

Solution

Upgrade to v23.3.0 or later.


Workaround

Use internal firewall features to limit access to the web management interface.

History

Fri, 20 Sep 2024 11:45:00 +0000

Type Values Removed Values Added
Description A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication. Malicious unauthenticated users with knowledge on the underlying system may be able to extract asset information. A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication. Malicious unauthenticated users with knowledge on the underlying system may be able to extract limited asset information.

cve-icon MITRE

Status: PUBLISHED

Assigner: Nozomi

Published:

Updated: 2025-06-17T21:09:23.231Z

Reserved: 2023-09-28T12:41:27.922Z

Link: CVE-2023-5253

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2024-01-15T11:15:08.627

Modified: 2024-11-21T08:41:22.837

Link: CVE-2023-5253

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.