NN-2023:10-01

DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0

Last update: 2024-09-19

Advisory IDNN-2023:10-01
TopicDoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0
CWE ImpactCWE-1286: Improper Validation of Syntactic Correctness of Input
Issue date2023-09-18
AffectsGuardian, CMC >= 22.6.0, < v22.6.3 or < v23.1.0
CVE Name(s)CVE-2023-32649
CVSS DetailsCVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS Score8.2 (CVSS v4.0)
7.5 (CVSS v3.1)
CVE Risk LevelHigh (CVSS v4.0)
High (CVSS v3.1)
Risk Level for Nozomi customersHigh

Summary

A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets.

Impact

During the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed.

Affected Products

Guardian, CMC >= 22.6.0, < v22.6.3 or < v23.1.0

Workarounds and Mitigations

N/A. It is recommended to monitor the IDS log to check for abnormal stops and restarts.

Solutions

Upgrade to v22.6.3, v23.1.0 or later.

Modification History

2023-09-18: Initial revision
2023-11-13: Migrated to CSAF VEX format
2023-11-16: CSAF vers improvements
2024-05-20: Added CVSS v4.0 scoring where applicable
2024-09-19: Revised CWE mapping

Related Links

Acknowledgements

We thank the following parties for their efforts:

  • Nozomi Networks for finding this issue during an internal investigation

Contact

Nozomi Networks Product Security team can be reached at prodsec@nozominetworks.com.
More contact details on the PSIRT page.