Advisory ID | NN-2024:1-01 |
---|---|
Topic | DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1 |
CWE Impact | CWE-1286: Improper Validation of Syntactic Correctness of Input |
Issue date | 2024-04-10 |
Affects | Guardian < v23.4.1 |
CVE Name(s) | CVE-2024-0218 |
CVSS Details | CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
CVSS Score | 8.2 (CVSS v4.0) 7.5 (CVSS v3.1) |
CVE Risk Level | High (CVSS v4.0) High (CVSS v3.1) |
Risk Level for Nozomi customers | High |
A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted malformed network packets to cause the IDS module to stop updating nodes, links, and assets.
Network traffic may not be analyzed until the IDS module is restarted.
Guardian < v23.4.1
N/A
Upgrade to v23.4.1 or later.
We thank the following parties for their efforts: