A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets.
During the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed.
References
Link | Resource |
---|---|
https://security.nozominetworks.com/NN-2023:10-01 | Vendor Advisory |
https://security.nozominetworks.com/NN-2023:10-01 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.nozominetworks.com/NN-2023:10-01 - Vendor Advisory |
20 Sep 2024, 11:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1286 |
28 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-19 11:16
Updated : 2024-11-21 08:03
NVD link : CVE-2023-32649
Mitre link : CVE-2023-32649
CVE.ORG link : CVE-2023-32649
JSON object : View
Products Affected
nozominetworks
- guardian
- cmc