Impact
An access control flaw allows an authenticated user with only view‑only rights for Threat Intelligence to execute administrative commands, modify rules, and potentially disrupt service availability. The weakness is a classic enforcement failure (CWE‑863).
Affected Systems
The vulnerability affects Nozomi Networks CMC and Guardian products running any version prior to 26.0.0. The flaw resides in the Threat Intelligence module of these platforms.
Risk and Exploitability
The CVSS score of 7.2 reflects a high impact and requires authenticated access. EPSS data is not available, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, suggesting low current exploitation activity. The attack path requires valid credentials for a user with view‑only privileges; once authenticated, the user can bypass permission checks and alter configuration or disrupt availability.
OpenCVE Enrichment