Infoblox has released a security update to fix a critical vulnerability in NIOS 8.5.2 and prior.
The severity of the addressed vulnerability could allow the remote attacker to execute arbitrary code on the system by sending a specially crafted request.
The addressed vulnerability arises due to a flawed component that doesn’t properly sanitize incoming malicious input. Its exploitation requires the malicious actors to access an authenticated feature within the NIOS UI, enabling them to execute the malicious input and gain shell access.
Infoblox NIOS code execution (CVE-2023-37249):
CVE-2023-37249
The enterprise should deploy this patch as soon as the testing phase is completed.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |