This could lead to unauthorized accesses and privilege escalation.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-59115 | Audit records for OpenAPI requests may include sensitive information. This could lead to unauthorized accesses and privilege escalation. |
Solution
Upgrade to v23.4.1 or later.
Workaround
Nozomi Networks recommends creating specific users for OpenAPI usage, with only the necessary permissions to access the required data sources. Additionally, it is advised to limit API keys to allowed IP addresses whenever possible. Finally, it is also suggested to regenerate existing API keys periodically and to review sign-ins via API keys in the audit records.
Link | Providers |
---|---|
https://security.nozominetworks.com/NN-2023:17-01 |
![]() ![]() |
Fri, 20 Sep 2024 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nozominetworks
Nozominetworks central Management Control Nozominetworks guardian |
|
Weaknesses | CWE-522 | |
CPEs | cpe:2.3:a:nozominetworks:central_management_control:*:*:*:*:*:*:*:* cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Nozominetworks
Nozominetworks central Management Control Nozominetworks guardian |
|
Metrics |
ssvc
|
Fri, 20 Sep 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-201 |

Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2024-09-20T11:47:45.639Z
Reserved: 2023-12-18T10:31:09.989Z
Link: CVE-2023-6916

Updated: 2024-08-02T08:42:08.668Z

Status : Awaiting Analysis
Published: 2024-04-10T16:15:09.190
Modified: 2024-11-21T08:44:49.807
Link: CVE-2023-6916

No data.

No data.