A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted malformed network packets to cause the IDS module to stop updating nodes, links, and assets.
Network traffic may not be analyzed until the IDS module is restarted.
References
Link | Resource |
---|---|
https://security.nozominetworks.com/NN-2024:1-01 |
Configurations
No configuration.
History
20 Sep 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-1286 | |
Summary |
|
28 May 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted malformed network packets to cause the IDS module to stop updating nodes, links, and assets. Network traffic may not be analyzed until the IDS module is restarted. |
10 Apr 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-10 16:15
Updated : 2024-09-20 13:15
NVD link : CVE-2024-0218
Mitre link : CVE-2024-0218
CVE.ORG link : CVE-2024-0218
JSON object : View
Products Affected
No product.
CWE
CWE-1286
Improper Validation of Syntactic Correctness of Input