INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global apt Multiple sectors HIGH 1h Global general Digital Content & Intellectual Property MEDIUM 1h Global malware Technology and Software Development CRITICAL 2h Global ddos Technology and Social Media HIGH 2h Global phishing Financial Services, Telecommunications, General Public HIGH 2h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors / Critical Infrastructure CRITICAL 3h Global malware Financial Services CRITICAL 4h Global general Software/Technology LOW 4h Global malware Energy CRITICAL 4h Global apt Multiple sectors HIGH 1h Global general Digital Content & Intellectual Property MEDIUM 1h Global malware Technology and Software Development CRITICAL 2h Global ddos Technology and Social Media HIGH 2h Global phishing Financial Services, Telecommunications, General Public HIGH 2h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors / Critical Infrastructure CRITICAL 3h Global malware Financial Services CRITICAL 4h Global general Software/Technology LOW 4h Global malware Energy CRITICAL 4h Global apt Multiple sectors HIGH 1h Global general Digital Content & Intellectual Property MEDIUM 1h Global malware Technology and Software Development CRITICAL 2h Global ddos Technology and Social Media HIGH 2h Global phishing Financial Services, Telecommunications, General Public HIGH 2h Global supply_chain Software Development and Technology CRITICAL 3h Global apt Multiple sectors / Critical Infrastructure CRITICAL 3h Global malware Financial Services CRITICAL 4h Global general Software/Technology LOW 4h Global malware Energy CRITICAL 4h
Vulnerabilities

CVE-2020-37078

High
i-doit Open Source CMDB 1.14.1 contains a file deletion vulnerability in the import module that allows authenticated attackers to delete arbitrary files by manipulating the delete_import parameter. At
CWE-73 — Weakness Type
Published: Feb 3, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

i-doit Open Source CMDB 1.14.1 contains a file deletion vulnerability in the import module that allows authenticated attackers to delete arbitrary files by manipulating the delete_import parameter. Attackers can send a POST request to the import module with a crafted filename to remove files from the server's filesystem.

🤖 AI Executive Summary

CVE-2020-37078 is a critical file deletion vulnerability in i-doit Open Source CMDB 1.14.1 that allows authenticated attackers to delete arbitrary files through the import module. By manipulating the delete_import parameter in POST requests, attackers can remove critical system files, potentially causing denial of service or system compromise. While no public exploit is available, the vulnerability requires only authentication and poses significant risk to organizations using this CMDB solution.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 21, 2026 23:52
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability primarily impacts Saudi government agencies, telecommunications providers (STC), and large enterprises using i-doit for IT asset management and configuration tracking. Government entities under NCA oversight and SAMA-regulated financial institutions face significant risk if CMDB systems are compromised. The ability to delete arbitrary files could lead to loss of critical configuration data, audit trail destruction, and operational disruption. Healthcare organizations and energy sector entities managing infrastructure through CMDB systems are also at elevated risk.
🏢 Affected Saudi Sectors
Government Telecommunications Banking and Financial Services Healthcare Energy and Utilities Large Enterprises
⚖️ Saudi Risk Score (AI)
7.8
/ 10.0
🔧 Remediation Steps (English)
Immediate Actions:
1. Identify all instances of i-doit Open Source CMDB 1.14.1 in your environment
2. Restrict access to the import module to trusted administrators only
3. Implement network-level access controls limiting POST requests to the import module
4. Review access logs for suspicious delete_import parameter usage

Patching:
1. Upgrade i-doit to version 1.14.2 or later immediately
2. Apply vendor security patches as released
3. Test patches in non-production environment before deployment

Compensating Controls:
1. Implement file integrity monitoring (FIM) on CMDB directories
2. Enable detailed audit logging for all import module activities
3. Implement role-based access control (RBAC) restricting import functionality
4. Configure filesystem permissions to prevent unauthorized file deletion
5. Maintain regular backups of CMDB data and configuration files

Detection:
1. Monitor for POST requests to import module with delete_import parameters
2. Alert on unexpected file deletions in CMDB directories
3. Track authentication events followed by import module access
4. Implement SIEM rules for suspicious import activity patterns
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع نسخ i-doit Open Source CMDB 1.14.1 في بيئتك
2. تقييد الوصول إلى وحدة الاستيراد للمسؤولين الموثوقين فقط
3. تطبيق عناصر التحكم في الوصول على مستوى الشبكة لتحديد طلبات POST إلى وحدة الاستيراد
4. مراجعة سجلات الوصول للكشف عن استخدام معامل delete_import المريب

التصحيح:
1. ترقية i-doit إلى الإصدار 1.14.2 أو أحدث فوراً
2. تطبيق تصحيحات الأمان من المورد عند إصدارها
3. اختبار التصحيحات في بيئة غير الإنتاج قبل النشر

عناصر التحكم البديلة:
1. تطبيق مراقبة سلامة الملفات (FIM) على دلائل CMDB
2. تفعيل تسجيل التدقيق التفصيلي لجميع أنشطة وحدة الاستيراد
3. تطبيق التحكم في الوصول القائم على الأدوار (RBAC) لتقييد وظائف الاستيراد
4. تكوين أذونات نظام الملفات لمنع حذف الملفات غير المصرح به
5. الحفاظ على نسخ احتياطية منتظمة من بيانات CMDB وملفات التكوين

الكشف:
1. مراقبة طلبات POST إلى وحدة الاستيراد مع معاملات delete_import
2. التنبيه على حذف الملفات غير المتوقعة في دلائل CMDB
3. تتبع أحداث المصادقة متبوعة بالوصول إلى وحدة الاستيراد
4. تطبيق قواعد SIEM لأنماط نشاط الاستيراد المريبة
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
A.5.1.1 - Information Security Policies and Procedures A.6.1.1 - Access Control Policy A.8.1.1 - Asset Management A.12.4.1 - Event Logging A.12.6.1 - Management of Technical Vulnerabilities
🔵 SAMA CSF
ID.AM-2 - Software Inventory PR.AC-1 - Access Control Policy PR.PT-2 - Protective Technology DE.CM-1 - Audit Logging RS.MI-2 - Incident Recovery
🟡 ISO 27001:2022
A.5.1 - Policies for Information Security A.6.1 - Internal Organization A.8.1 - Asset Inventory A.12.4 - Logging A.12.6 - Management of Technical Vulnerabilities
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-73
EPSS0.05%
Exploit No
Patch ✓ Yes
Published 2026-02-03
Source Feed nvd
Views 4
🇸🇦 Saudi Risk Score
7.8
/ 10.0 — Saudi Risk
Priority: HIGH
🏷️ Tags
CWE-73
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.