Infoblox’s global team of threat hunters uncovers a DNS operation with the ability to bypass traditional security measures and control the Great Firewall of China. Read about “Muddling Meerkat” and the many other threat actors discovered by Infoblox Threat Intel here.

General Security & Cybersecurity Ecosystem


NIOS XML Vulnerability

[ Edited ]
New Member
Posts: 12
7871     1


A vulnerability in Infoblox NIOS may allow for an XML Bomb attack. The configuration for SAML authentication service for the application can be imported by a privileged user from an XML file without validation, potentially resulting in a Denial of Service (DOS).


The Infoblox NIOS application allows users to import authentication service configurations by parsing an XML file, without prior validation of the file’s content. This may be exploited by a malicious user by uploading an XML file with calls to recursive entities. The server will be delayed while parsing the content of the XML file, resulting in a DOS.


CVE: CVE-2020-15303

CVSSv3 Score: 7.7 (AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)


Affected NIOS Versions:

Affects NIOS versions which support SAML authentication. Specifically:

NIOS 8.4.0 through NIOS 8.4.8

NIOS 8.5.0,  NIOS 8.5.1





Infoblox addresses the CVE: CVE-2020-15303 vulnerability in NIOS 8.5.2. 


To eliminate the possibility of exploiting the above vulnerability, Infoblox strongly recommends  upgrading to NIOS 8.5.2 or above.

Showing results for 
Search instead for 
Did you mean: 

Recommended for You