A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets.
During the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed.
References
Link | Resource |
---|---|
https://security.nozominetworks.com/NN-2023:10-01 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
20 Sep 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1286 |
28 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-19 11:16
Updated : 2024-09-20 11:15
NVD link : CVE-2023-32649
Mitre link : CVE-2023-32649
CVE.ORG link : CVE-2023-32649
JSON object : View
Products Affected
nozominetworks
- cmc
- guardian