// For flags

CVE-2023-32649

DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0

Severity Score

8.2
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets.

During the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed.

Vulnerabilidad de Denegación de Servicio (Dos) en Nozomi Networks Guardian y CMC, debido a una validación de entrada incorrecta en ciertos campos utilizados en la funcionalidad de inteligencia de activos de nuestro IDS, permite a un atacante no autenticado bloquear el módulo IDS enviando paquetes de red con formato incorrecto especialmente manipulado. Durante el período de tiempo (limitado) antes de que el módulo IDS se reinicie automáticamente, es posible que no se analice el tráfico de red.

*Credits: This issue was found by Nozomi Networks during an internal investigation.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
Present
Privileges Required
None
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
None
None
Integrity
None
None
Availability
High
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2023-06-12 CVE Reserved
  • 2023-09-19 CVE Published
  • 2024-08-02 CVE Updated
  • 2024-08-19 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
  • CAPEC-607: Obstruction
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Nozominetworks
Search vendor "Nozominetworks"
Cmc
Search vendor "Nozominetworks" for product "Cmc"
>= 22.6.0 < 22.6.3
Search vendor "Nozominetworks" for product "Cmc" and version " >= 22.6.0 < 22.6.3"
-
Affected
Nozominetworks
Search vendor "Nozominetworks"
Cmc
Search vendor "Nozominetworks" for product "Cmc"
>= 23.0.0 < 23.1.0
Search vendor "Nozominetworks" for product "Cmc" and version " >= 23.0.0 < 23.1.0"
-
Affected
Nozominetworks
Search vendor "Nozominetworks"
Guardian
Search vendor "Nozominetworks" for product "Guardian"
>= 22.6.0 < 22.6.3
Search vendor "Nozominetworks" for product "Guardian" and version " >= 22.6.0 < 22.6.3"
-
Affected
Nozominetworks
Search vendor "Nozominetworks"
Guardian
Search vendor "Nozominetworks" for product "Guardian"
>= 23.0.0 < 23.1.0
Search vendor "Nozominetworks" for product "Guardian" and version " >= 23.0.0 < 23.1.0"
-
Affected