// For flags

CVE-2024-0218

DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1

Severity Score

8.2
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted malformed network packets to cause the IDS module to stop updating nodes, links, and assets.



Network traffic may not be analyzed until the IDS module is restarted.

Una vulnerabilidad de denegación de servicio (DOS) en Nozomi Networks Guardian, causada por una validación de entrada incorrecta en ciertos campos utilizados en la funcionalidad de análisis Radius de nuestro IDS, permite que un atacante no autenticado envíe paquetes de red mal formados especialmente manipulados para provocar que el módulo IDS deje de actualizar los nodos, enlaces y activos. Es posible que el tráfico de red no se analice hasta que se reinicie el módulo IDS.

*Credits: This issue was found by Nozomi Networks during an internal investigation that followed a bug report from one of our customers.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
Present
Privileges Required
None
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
None
None
Integrity
None
None
Availability
High
Low
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-01-03 CVE Reserved
  • 2024-04-10 CVE Published
  • 2024-04-11 EPSS Updated
  • 2024-09-20 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-1286: Improper Validation of Syntactic Correctness of Input
CAPEC
  • CAPEC-607: Obstruction
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Nozomi Networks
Search vendor "Nozomi Networks"
Guardian
Search vendor "Nozomi Networks" for product "Guardian"
< 23.4.1
Search vendor "Nozomi Networks" for product "Guardian" and version " < 23.4.1"
en
Affected