INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global data_breach Multiple sectors HIGH 59m Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 3h Global data_breach Multiple sectors HIGH 59m Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 3h Global data_breach Multiple sectors HIGH 59m Global vulnerability Government and Critical Infrastructure CRITICAL 1h Global vulnerability Multiple sectors CRITICAL 1h Global apt Financial Services, Government HIGH 1h Global insider Cross-sector CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global vulnerability Information Technology / Software Infrastructure CRITICAL 2h Global data_breach Healthcare CRITICAL 2h Global malware Financial Services HIGH 2h Global vulnerability Technology/Software Development HIGH 3h
Vulnerabilities

CVE-2023-29492

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Novi Survey Insecure Deserialization Vulnerability — Novi Survey contains an insecure deserialization vulnerability that allows remote attackers to execute code on the server in the context of the ser
Published: Apr 13, 2023  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Novi Survey Insecure Deserialization Vulnerability — Novi Survey contains an insecure deserialization vulnerability that allows remote attackers to execute code on the server in the context of the service account.

🤖 AI Executive Summary

CVE-2023-29492 is a critical insecure deserialization vulnerability in Novi Survey with a CVSS score of 9.0, allowing unauthenticated remote attackers to execute arbitrary code on the server in the context of the service account. This vulnerability has a confirmed public exploit available, significantly elevating the risk of active exploitation in the wild. Organizations using Novi Survey for data collection, research, or feedback management are at immediate risk of full server compromise. A patch is available and should be applied with the highest urgency.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 19, 2026 00:21
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations leveraging Novi Survey for internal or public-facing surveys — including government ministries, healthcare institutions, and academic bodies — are directly at risk. Government entities under NCA oversight using survey platforms for citizen engagement or internal assessments face potential data exfiltration and lateral movement risks. Healthcare organizations (MOH, hospital networks) using survey tools for patient feedback or clinical research data collection are particularly vulnerable. Banking and financial institutions under SAMA that use third-party survey tools for customer satisfaction or compliance assessments may also be impacted. The ability to execute code as the service account could allow attackers to pivot into internal networks, exfiltrate sensitive data, or establish persistent backdoors within Saudi critical infrastructure environments.
🏢 Affected Saudi Sectors
Government Healthcare Education Banking Telecom Energy Retail
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all instances of Novi Survey deployed across your environment (on-premises and cloud-hosted).
2. Isolate Novi Survey servers from public internet access immediately if patching cannot be performed right away.
3. Apply the official vendor patch released to address CVE-2023-29492 — upgrade to the latest patched version of Novi Survey immediately.

PATCHING GUIDANCE:
4. Download and apply the latest Novi Survey update from the official vendor portal.
5. Verify patch integrity using vendor-provided checksums before deployment.
6. Restart services after patching and confirm version numbers reflect the patched release.

COMPENSATING CONTROLS (if patching is delayed):
7. Implement Web Application Firewall (WAF) rules to detect and block deserialization attack payloads targeting Novi Survey endpoints.
8. Restrict network access to Novi Survey to trusted IP ranges only using firewall ACLs.
9. Run Novi Survey under a least-privilege service account with no administrative rights.
10. Enable enhanced logging on the Novi Survey server and forward logs to SIEM.

DETECTION RULES:
11. Monitor for unusual process spawning from the Novi Survey service process (e.g., cmd.exe, powershell.exe, bash).
12. Alert on outbound network connections from the Novi Survey service to unknown external IPs.
13. Search SIEM for HTTP POST requests with large or malformed serialized payloads to Novi Survey endpoints.
14. Deploy EDR behavioral rules to detect deserialization exploitation patterns (e.g., Java/PHP/Python gadget chains).
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع نسخ Novi Survey المنتشرة في بيئتك (محلية أو سحابية).
2. عزل خوادم Novi Survey عن الإنترنت العام فوراً إذا تعذّر التصحيح الفوري.
3. تطبيق التصحيح الرسمي من المورد لمعالجة CVE-2023-29492 والترقية إلى أحدث إصدار مُصحَّح.

إرشادات التصحيح:
4. تنزيل وتطبيق آخر تحديث لـ Novi Survey من البوابة الرسمية للمورد.
5. التحقق من سلامة التصحيح باستخدام قيم التحقق المقدمة من المورد قبل النشر.
6. إعادة تشغيل الخدمات بعد التصحيح والتأكد من أن أرقام الإصدارات تعكس الإصدار المُصحَّح.

ضوابط التعويض (في حال تأخر التصحيح):
7. تطبيق قواعد جدار حماية تطبيقات الويب (WAF) لاكتشاف وحجب حمولات هجمات إلغاء التسلسل.
8. تقييد الوصول الشبكي إلى Novi Survey على نطاقات IP الموثوقة فقط.
9. تشغيل Novi Survey تحت حساب خدمة بأدنى صلاحيات ممكنة.
10. تفعيل التسجيل المعزز على خادم Novi Survey وإرسال السجلات إلى نظام SIEM.

قواعد الكشف:
11. مراقبة العمليات غير المعتادة الناشئة عن عملية خدمة Novi Survey (مثل cmd.exe أو powershell.exe).
12. التنبيه على الاتصالات الصادرة من خدمة Novi Survey إلى عناوين IP خارجية غير معروفة.
13. البحث في SIEM عن طلبات HTTP POST تحتوي على حمولات متسلسلة كبيرة أو مشوهة.
14. نشر قواعد سلوكية في EDR للكشف عن أنماط استغلال إلغاء التسلسل.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-2-1: Cybersecurity Risk Management ECC-3-1: Asset Management — identification of vulnerable survey systems ECC-3-3: Vulnerability Management — timely patching of critical vulnerabilities ECC-3-5: Application Security — secure deserialization practices ECC-3-6: Change Management — controlled patching process ECC-4-1: Cybersecurity Incident Management — detection and response to exploitation attempts
🔵 SAMA CSF
Protect — PR.IP: Information Protection Processes and Procedures Protect — PR.PT: Protective Technology — WAF and network segmentation Detect — DE.CM: Security Continuous Monitoring — SIEM alerting on exploitation Respond — RS.MI: Mitigation of active exploitation Identify — ID.RA: Risk Assessment for third-party survey applications
🟡 ISO 27001:2022
A.8.8 — Management of technical vulnerabilities A.8.25 — Secure development lifecycle A.8.28 — Secure coding (deserialization controls) A.8.20 — Network security controls A.8.16 — Monitoring activities A.5.30 — ICT readiness for business continuity
🟣 PCI DSS v4.0
Requirement 6.3.3 — All system components protected from known vulnerabilities via patching Requirement 6.4 — Web-facing applications protected against known attacks Requirement 11.3 — External and internal vulnerability scanning Requirement 12.3.2 — Targeted risk analysis for survey/data collection systems
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Novi Survey:Novi Survey
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS17.17%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2023-05-04
Published 2023-04-13
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.