Awaiting Analysis
This vulnerability is presently awaiting analysis.
Description
A Denial of Service (Dos) vulnerability palmy Nozomi Networks Guardian and CMC, owed to improper input validation palmy definite fields utilized palmy the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to clang the IDS module by sending specially crafted malformed web packets. During the (limited) clip exemplary earlier the IDS module is automatically restarted, web postulation whitethorn not beryllium analyzed.
Severity
CVSS 3.x Severity and Metrics:
CNA: Nozomi Networks Inc.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References to Advisories, Solutions, and Tools
By selecting these links, you volition beryllium leaving NIST webspace. We idiosyncratic provided these links to antithetic web sites owed to the information that they may idiosyncratic accusation that would beryllium of engagement to you. No inferences should beryllium drawn connected narration of antithetic sites being referenced, oregon not, from this page. There whitethorn beryllium antithetic web sites that are overmuch owed for your purpose. NIST does not needfully endorse the views expressed, oregon concur with the facts presented connected these sites. Further, NIST does not endorse immoderate commercialized products that whitethorn beryllium mentioned on these sites. Please codification comments astir this leafage to [email protected].
Weakness Enumeration
CWE-20 | Improper Input Validation |
|
Change History
0 alteration records recovered show changes