NN-2023:10-01

DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0

Last update: 2023-11-16

Advisory IDNN-2023:10-01
TopicDoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0
CWE ImpactCWE-20: Improper Input Validation
Issue date2023-09-18
AffectsGuardian, CMC >= 22.6.0, < v22.6.3 or < v23.1.0
CVE Name(s)CVE-2023-32649
CVSS detailsCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS Score7.5
CVE Risk LevelHigh
Risk Level for Nozomi customersHigh

Summary

A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets.

Impact

During the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed.

Affected Products

Guardian, CMC >= 22.6.0, < v22.6.3 or < v23.1.0

Workarounds and Mitigations

N/A. It is recommended to monitor the IDS log to check for abnormal stops and restarts.

Solutions

Upgrade to v22.6.3, v23.1.0 or later.

Modification History

2023-09-18: Initial revision
2023-11-13: Migrated to CSAF VEX format
2023-11-16: CSAF vers improvements

Related Links

Acknowledgements

We thank the following parties for their efforts:

  • Nozomi Networks for finding this issue during an internal investigation

Contact

Nozomi Networks Product Security team can be reached at prodsec@nozominetworks.com.
More contact details on the PSIRT page.