A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets.
During the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://security.nozominetworks.com/NN-2023:10-01 |
![]() ![]() |
History
Tue, 04 Mar 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 20 Sep 2024 10:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-1286 |

Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2025-02-27T20:49:35.570Z
Reserved: 2023-06-12T09:20:58.638Z
Link: CVE-2023-32649

Updated: 2024-08-02T15:25:36.692Z

Status : Modified
Published: 2023-09-19T11:16:20.297
Modified: 2024-11-21T08:03:46.247
Link: CVE-2023-32649

No data.