A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets.
During the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://security.nozominetworks.com/NN-2023:10-01 |
|
History
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Sep 2024 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1286 |
Status: PUBLISHED
Assigner: Nozomi
Published: 2023-09-19T10:06:15.601Z
Updated: 2025-02-27T20:49:35.570Z
Reserved: 2023-06-12T09:20:58.638Z
Link: CVE-2023-32649
Updated: 2024-08-02T15:25:36.692Z
Status : Modified
Published: 2023-09-19T11:16:20.297
Modified: 2024-11-21T08:03:46.247
Link: CVE-2023-32649
No data.