nn-2024_1-01
Vulnerability from csaf_nozominetworks
Published
2024-04-10 11:00
Modified
2024-09-19 11:00
Summary
DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1
Notes
Risk Level for Nozomi customers
High
{ "document": { "aggregate_severity": { "text": "HIGH" }, "category": "csaf_vex", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "en-US", "notes": [ { "category": "other", "text": "High", "title": "Risk Level for Nozomi customers" } ], "publisher": { "category": "vendor", "contact_details": "Nozomi Networks Product Security team can be reached at prodsec@nozominetworks.com", "name": "Nozomi Networks Product Security", "namespace": "https://security.nozominetworks.com/psirt" }, "title": "DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1", "tracking": { "aliases": [ "CVE-2024-0218" ], "current_release_date": "2024-09-19T11:00:00.000Z", "id": "NN-2024:1-01", "initial_release_date": "2024-04-10T11:00:00.000Z", "revision_history": [ { "date": "2024-04-10T11:00:00.000Z", "number": "1", "summary": "Initial revision" }, { "date": "2024-05-20T11:00:00.000Z", "number": "2", "summary": "Added CVSS v4.0 scoring where applicable" }, { "date": "2024-09-19T11:00:00.000Z", "number": "3", "summary": "Revised CWE mapping" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:gem/\u003c23.4.1", "product": { "name": "Nozomi Networks Guardian \u003c23.4.1", "product_id": "CSAFPID-0001" } }, { "category": "product_version", "name": "23.4.1", "product": { "name": "Nozomi Networks Guardian 23.4.1", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "Guardian" } ], "category": "vendor", "name": "Nozomi Networks" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "organization": "Nozomi Networks", "summary": "discovering this issue during an internal investigation that followed a bug report from one of our customers." } ], "cve": "CVE-2024-0218", "cwe": { "id": "CWE-1286", "name": "Improper Validation of Syntactic Correctness of Input" }, "discovery_date": "2024-04-10T11:00:00.000Z", "ids": [ { "system_name": "Nozomi Networks Security Advisory ID", "text": "NN-2024:1-01" } ], "notes": [ { "category": "summary", "text": "A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted malformed network packets to cause the IDS module to stop updating nodes, links, and assets.", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "CSAFPID-0002" ], "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "Mitre CVE entry", "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0218" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.nozominetworks.com/csaf/2024/nn-2024_1-01.json" }, { "category": "self", "summary": "Human-readable advisory.", "url": "https://security.nozominetworks.com/NN-2024:1-01" } ], "remediations": [ { "category": "mitigation", "details": "N/A", "product_ids": [ "CSAFPID-0001" ] }, { "category": "vendor_fix", "details": "Upgrade to v23.4.1 or later.", "product_ids": [ "CSAFPID-0001" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-0001" ] } ], "threats": [ { "category": "impact", "details": "Network traffic may not be analyzed until the IDS module is restarted." } ], "title": "DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.