A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted malformed network packets to cause the IDS module to stop updating nodes, links, and assets.
Network traffic may not be analyzed until the IDS module is restarted.
References
Configurations
No configuration.
History
21 Nov 2024, 08:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.nozominetworks.com/NN-2024:1-01 - |
20 Sep 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1286 | |
Summary |
|
28 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted malformed network packets to cause the IDS module to stop updating nodes, links, and assets. Network traffic may not be analyzed until the IDS module is restarted. |
10 Apr 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-10 16:15
Updated : 2024-11-21 08:46
NVD link : CVE-2024-0218
Mitre link : CVE-2024-0218
CVE.ORG link : CVE-2024-0218
JSON object : View
Products Affected
No product.
CWE
CWE-1286
Improper Validation of Syntactic Correctness of Input