{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-32649","assignerOrgId":"bec8025f-a851-46e5-b3a3-058e6b0aa23c","state":"PUBLISHED","assignerShortName":"Nozomi","dateReserved":"2023-06-12T09:20:58.638Z","datePublished":"2023-09-19T10:06:15.601Z","dateUpdated":"2025-02-27T20:49:35.570Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Guardian","vendor":"Nozomi Networks","versions":[{"lessThan":"22.6.3","status":"affected","version":"22.6.0","versionType":"semver"},{"lessThan":"23.1.0","status":"affected","version":"23.0.0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"CMC","vendor":"Nozomi Networks","versions":[{"lessThan":"22.6.3","status":"affected","version":"22.6.0","versionType":"semver"},{"lessThan":"23.1.0","status":"affected","version":"23.0.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"This issue was found by Nozomi Networks during an internal investigation."}],"datePublic":"2023-09-18T07:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div><div>A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets.</div><div>During the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed.</div></div>"}],"value":"A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets.\n\nDuring the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed."}],"impacts":[{"capecId":"CAPEC-607","descriptions":[{"lang":"en","value":"CAPEC-607 Obstruction"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":8.2,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1286","description":"CWE-1286 Improper Validation of Syntactic Correctness of Input","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"bec8025f-a851-46e5-b3a3-058e6b0aa23c","shortName":"Nozomi","dateUpdated":"2024-09-20T10:42:46.786Z"},"references":[{"url":"https://security.nozominetworks.com/NN-2023:10-01"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div><div>Upgrade to v22.6.3, v23.1.0 or later.</div></div>"}],"value":"Upgrade to v22.6.3, v23.1.0 or later."}],"source":{"discovery":"INTERNAL"},"title":"DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div><div>N/A. It is recommended to monitor the IDS log to check for abnormal stops and restarts.</div></div>"}],"value":"N/A. It is recommended to monitor the IDS log to check for abnormal stops and restarts."}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T15:25:36.692Z"},"title":"CVE Program Container","references":[{"url":"https://security.nozominetworks.com/NN-2023:10-01","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-26T21:50:16.637812Z","id":"CVE-2023-32649","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-27T20:49:35.570Z"}}]}}