A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted malformed network packets to cause the IDS module to stop updating nodes, links, and assets. Network traffic may not be analyzed until the IDS module is restarted.
History

Fri, 20 Sep 2024 13:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20

Fri, 20 Sep 2024 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Nozominetworks
Nozominetworks guardian
CPEs cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:*
Vendors & Products Nozominetworks
Nozominetworks guardian
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Sep 2024 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1286

cve-icon MITRE

Status: PUBLISHED

Assigner: Nozomi

Published: 2024-04-10T15:55:59.971Z

Updated: 2024-09-20T12:19:42.524Z

Reserved: 2024-01-03T14:37:40.239Z

Link: CVE-2024-0218

cve-icon Vulnrichment

Updated: 2024-08-01T17:41:16.232Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-10T16:15:09.413

Modified: 2024-11-21T08:46:05.150

Link: CVE-2024-0218

cve-icon Redhat

No data.