{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-0218","assignerOrgId":"bec8025f-a851-46e5-b3a3-058e6b0aa23c","state":"PUBLISHED","assignerShortName":"Nozomi","dateReserved":"2024-01-03T14:37:40.239Z","datePublished":"2024-04-10T15:55:59.971Z","dateUpdated":"2024-09-20T12:19:42.524Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Guardian","vendor":"Nozomi Networks","versions":[{"lessThan":"23.4.1","status":"affected","version":"0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"This issue was found by Nozomi Networks during an internal investigation that followed a bug report from one of our customers."}],"datePublic":"2024-04-10T15:53:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div><div>A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted malformed network packets to cause the IDS module to stop updating nodes, links, and assets.</div></div><div><div>Network traffic may not be analyzed until the IDS module is restarted.</div></div>"}],"value":"A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted malformed network packets to cause the IDS module to stop updating nodes, links, and assets.\n\n\n\nNetwork traffic may not be analyzed until the IDS module is restarted."}],"impacts":[{"capecId":"CAPEC-607","descriptions":[{"lang":"en","value":"CAPEC-607 Obstruction"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"NETWORK","baseScore":8.2,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-1286","description":"CWE-1286 Improper Validation of Syntactic Correctness of Input","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"bec8025f-a851-46e5-b3a3-058e6b0aa23c","shortName":"Nozomi","dateUpdated":"2024-09-20T12:19:42.524Z"},"references":[{"url":"https://security.nozominetworks.com/NN-2024:1-01"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div><div>Upgrade to v23.4.1 or later.</div></div>"}],"value":"Upgrade to v23.4.1 or later."}],"source":{"discovery":"INTERNAL"},"title":"DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T17:41:16.232Z"},"title":"CVE Program Container","references":[{"url":"https://security.nozominetworks.com/NN-2024:1-01","tags":["x_transferred"]}]},{"affected":[{"vendor":"nozominetworks","product":"guardian","cpes":["cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","versions":[{"version":"0","status":"affected","lessThan":"23.4.1","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-04-10T19:59:08.236018Z","id":"CVE-2024-0218","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-12T17:25:55.852Z"}}]}}