{"api_version":"1","generated_at":"2026-04-17T06:07:10+00:00","cve":"CVE-2023-32649","urls":{"html":"https://cve.report/CVE-2023-32649","api":"https://cve.report/api/cve/CVE-2023-32649.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-32649","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-32649"},"summary":{"title":"CVE-2023-32649","description":"A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets.\n\nDuring the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed.","state":"PUBLIC","assigner":"prodsec@nozominetworks.com","published_at":"2023-09-19 11:16:00","updated_at":"2023-09-21 19:04:00"},"problem_types":["CWE-20"],"metrics":[],"references":[{"url":"https://security.nozominetworks.com/NN-2023:10-01","name":"https://security.nozominetworks.com/NN-2023:10-01","refsource":"MISC","tags":[],"title":"NN-2023:10-01 - DoS on IDS parsing of malformed asset fields in Guardian/CMC >= 22.6.0 before 22.6.3 and 23.1.0 - CVE-2023-32649 | Product Security Incident Response Portal","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-32649","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32649","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"32649","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nozominetworks","cpe5":"cmc","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"32649","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"nozominetworks","cpe5":"guardian","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-32649","ASSIGNER":"prodsec@nozominetworks.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A Denial of Service (Dos) vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain fields used in the Asset Intelligence functionality of our IDS, allows an unauthenticated attacker to crash the IDS module by sending specially crafted malformed network packets.\n\nDuring the (limited) time window before the IDS module is automatically restarted, network traffic may not be analyzed.\n\n\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-20 Improper Input Validation","cweId":"CWE-20"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Nozomi Networks","product":{"product_data":[{"product_name":"Guardian","version":{"version_data":[{"version_affected":"<","version_name":"22.6.0","version_value":"22.6.3"},{"version_affected":"<","version_name":"23.0.0","version_value":"23.1.0"}]}},{"product_name":"CMC","version":{"version_data":[{"version_affected":"<","version_name":"22.6.0","version_value":"22.6.3"},{"version_affected":"<","version_name":"23.0.0","version_value":"23.1.0"}]}}]}}]}},"references":{"reference_data":[{"url":"https://security.nozominetworks.com/NN-2023:10-01","refsource":"MISC","name":"https://security.nozominetworks.com/NN-2023:10-01"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"INTERNAL"},"work_around":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div><div>N/A. It is recommended to monitor the IDS log to check for abnormal stops and restarts.</div></div>"}],"value":"N/A. It is recommended to monitor the IDS log to check for abnormal stops and restarts.\n\n\n\n"}],"solution":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<div><div>Upgrade to v22.6.3, v23.1.0 or later.</div></div>"}],"value":"Upgrade to v22.6.3, v23.1.0 or later.\n\n\n\n"}],"credits":[{"lang":"en","value":"This issue was found by Nozomi Networks during an internal investigation."}],"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-09-19 11:16:00","lastModifiedDate":"2023-09-21 19:04:00","problem_types":["CWE-20"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nozominetworks:cmc:*:*:*:*:*:*:*:*","versionStartIncluding":"23.0.0","versionEndExcluding":"23.1.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:*","versionStartIncluding":"23.0.0","versionEndExcluding":"23.1.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:*","versionStartIncluding":"22.6.0","versionEndExcluding":"22.6.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:nozominetworks:cmc:*:*:*:*:*:*:*:*","versionStartIncluding":"22.6.0","versionEndExcluding":"22.6.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}