A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted malformed network packets to cause the IDS module to stop updating nodes, links, and assets.
Network traffic may not be analyzed until the IDS module is restarted.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://security.nozominetworks.com/NN-2024:1-01 |
History
Fri, 20 Sep 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-20 |
Fri, 20 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Nozominetworks
Nozominetworks guardian |
|
CPEs | cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:* | |
Vendors & Products |
Nozominetworks
Nozominetworks guardian |
|
Metrics |
ssvc
|
Fri, 20 Sep 2024 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-1286 |
MITRE
Status: PUBLISHED
Assigner: Nozomi
Published: 2024-04-10T15:55:59.971Z
Updated: 2024-09-20T12:19:42.524Z
Reserved: 2024-01-03T14:37:40.239Z
Link: CVE-2024-0218
Vulnrichment
Updated: 2024-08-01T17:41:16.232Z
NVD
Status : Awaiting Analysis
Published: 2024-04-10T16:15:09.413
Modified: 2024-11-21T08:46:05.150
Link: CVE-2024-0218
Redhat
No data.