CVE-2023-32649

2 days ago 32

Awaiting Analysis


This vulnerability is presently awaiting analysis.

Description

A Denial of Service (Dos) vulnerability successful Nozomi Networks Guardian and CMC, owed to improper input validation successful definite fields utilized successful the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to clang the IDS module by sending specially crafted malformed web packets. During the (limited) clip model earlier the IDS module is automatically restarted, web postulation whitethorn not beryllium analyzed.


Severity

CVSS 3.x Severity and Metrics:


NIST CVSS score

NIST: NVD

Base Score:  N/A

NVD score not yet provided.


Nist CVSS people     does not lucifer  with CNA score

CNA:  Nozomi Networks Inc.

Vector:  CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

By selecting these links, you volition beryllium leaving NIST webspace. We person provided these links to different web sites due to the fact that they may person accusation that would beryllium of involvement to you. No inferences should beryllium drawn connected relationship of different sites being referenced, oregon not, from this page. There whitethorn beryllium different web sites that are much due for your purpose. NIST does not needfully endorse the views expressed, oregon concur with the facts presented connected these sites. Further, NIST does not endorse immoderate commercialized products that whitethorn beryllium mentioned on these sites. Please code comments astir this leafage to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-20 Improper Input Validation Reference acceptance level Nozomi Networks Inc.  

Change History

0 alteration records recovered show changes

Read Entire Article