A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets.
During the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://security.nozominetworks.com/NN-2023:10-01 |
History
Fri, 20 Sep 2024 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-1286 |
MITRE
Status: PUBLISHED
Assigner: Nozomi
Published: 2023-09-19T10:06:15.601Z
Updated: 2024-09-20T10:42:46.786Z
Reserved: 2023-06-12T09:20:58.638Z
Link: CVE-2023-32649
Vulnrichment
No data.
NVD
Status : Modified
Published: 2023-09-19T11:16:20.297
Modified: 2024-11-21T08:03:46.247
Link: CVE-2023-32649
Redhat
No data.