Advisory ID | NN-2023:10-01 |
---|---|
Topic | DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 |
CWE Impact | CWE-1286: Improper Validation of Syntactic Correctness of Input |
Issue date | 2023-09-18 |
Affects | Guardian, CMC >= 22.6.0, < v22.6.3 or < v23.1.0 |
CVE Name(s) | CVE-2023-32649 |
CVSS Details | CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
CVSS Score | 8.2 (CVSS v4.0) 7.5 (CVSS v3.1) |
CVE Risk Level | High (CVSS v4.0) High (CVSS v3.1) |
Risk Level for Nozomi customers | High |
A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets.
During the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed.
Guardian, CMC >= 22.6.0, < v22.6.3 or < v23.1.0
N/A. It is recommended to monitor the IDS log to check for abnormal stops and restarts.
Upgrade to v22.6.3, v23.1.0 or later.
We thank the following parties for their efforts: