Audit records for OpenAPI requests may include sensitive information.



This could lead to unauthorized accesses and privilege escalation.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-59115 Audit records for OpenAPI requests may include sensitive information. This could lead to unauthorized accesses and privilege escalation.
Fixes

Solution

Upgrade to v23.4.1 or later.


Workaround

Nozomi Networks recommends creating specific users for OpenAPI usage, with only the necessary permissions to access the required data sources. Additionally, it is advised to limit API keys to allowed IP addresses whenever possible. Finally, it is also suggested to regenerate existing API keys periodically and to review sign-ins via API keys in the audit records.

History

Fri, 20 Sep 2024 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Nozominetworks
Nozominetworks central Management Control
Nozominetworks guardian
Weaknesses CWE-522
CPEs cpe:2.3:a:nozominetworks:central_management_control:*:*:*:*:*:*:*:*
cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:*
Vendors & Products Nozominetworks
Nozominetworks central Management Control
Nozominetworks guardian
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Sep 2024 12:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-201

cve-icon MITRE

Status: PUBLISHED

Assigner: Nozomi

Published:

Updated: 2024-09-20T11:47:45.639Z

Reserved: 2023-12-18T10:31:09.989Z

Link: CVE-2023-6916

cve-icon Vulnrichment

Updated: 2024-08-02T08:42:08.668Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-10T16:15:09.190

Modified: 2024-11-21T08:44:49.807

Link: CVE-2023-6916

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.