We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-0218

DoS on IDS parsing of malformed Radius packets in Guardian before 23.4.1



Description

A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian, caused by improper input validation in certain fields used in the Radius parsing functionality of our IDS, allows an unauthenticated attacker sending specially crafted malformed network packets to cause the IDS module to stop updating nodes, links, and assets. Network traffic may not be analyzed until the IDS module is restarted.

Reserved 2024-01-03 | Published 2024-04-10 | Updated 2024-09-20 | Assigner Nozomi


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

HIGH: 8.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L

Problem types

CWE-1286 Improper Validation of Syntactic Correctness of Input

Product status

Default status
unaffected

Any version before 23.4.1
affected

Credits

This issue was found by Nozomi Networks during an internal investigation that followed a bug report from one of our customers. finder

References

security.nozominetworks.com/NN-2024:1-01

cve.org (CVE-2024-0218)

nvd.nist.gov (CVE-2024-0218)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-0218

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.