Vulnerabilities (CVE)

Filtered by vendor Stormshield Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-41166 1 Stormshield 1 Stormshield Network Security 2023-12-29 N/A 5.3 MEDIUM
An issue was discovered in Stormshield Network Security (SNS) 3.7.0 through 3.7.39, 3.11.0 through 3.11.27, 4.3.0 through 4.3.22, 4.6.0 through 4.6.9, and 4.7.0 through 4.7.1. It's possible to know if a specific user account exists on the SNS firewall by using remote access commands.
CVE-2023-47093 1 Stormshield 1 Stormshield Network Security 2023-12-29 N/A 6.5 MEDIUM
An issue was discovered in Stormshield Network Security (SNS) 4.0.0 through 4.3.21, 4.4.0 through 4.6.8, and 4.7.0. Sending a crafted ICMP packet may lead to a crash of the ASQ engine.
CVE-2022-4304 2 Openssl, Stormshield 4 Openssl, Endpoint Security, Sslvpn and 1 more 2023-08-08 N/A 5.9 MEDIUM
A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.
CVE-2021-31814 1 Stormshield 1 Stormshield Network Security 2023-08-08 3.6 LOW 6.1 MEDIUM
In Stormshield 1.1.0, and 2.1.0 through 2.9.0, an attacker can block a client from accessing the VPN and can obtain sensitive information through the SN VPN SSL Client.
CVE-2021-45089 1 Stormshield 1 Endpoint Security 2022-07-12 2.3 LOW 5.2 MEDIUM
Stormshield Endpoint Security 2.x before 2.1.2 has Incorrect Access Control.
CVE-2021-45091 1 Stormshield 1 Endpoint Security 2022-07-12 4.0 MEDIUM 4.3 MEDIUM
Stormshield Endpoint Security from 2.1.0 to 2.1.1 has Incorrect Access Control.
CVE-2021-27506 3 Clamav, Netasq Project, Stormshield 3 Clamav, Netasq, Network Security 2022-07-01 4.3 MEDIUM 5.5 MEDIUM
The ClamAV Engine (version 0.103.1 and below) component embedded in Storsmshield Network Security (SNS) is subject to DoS in case of parsing of malformed png files. This affect Netasq versions 9.1.0 to 9.1.11 and SNS versions 1.0.0 to 4.2.0. This issue is fixed in SNS 3.7.19, 3.11.7 and 4.2.1.
CVE-2021-3398 1 Stormshield 1 Stormshield Network Security 2022-02-23 5.0 MEDIUM 5.8 MEDIUM
Stormshield Network Security (SNS) 3.x has an Integer Overflow in the high-availability component.
CVE-2021-37613 1 Stormshield 1 Stormshield Network Security 2022-02-17 2.9 LOW 6.5 MEDIUM
Stormshield Network Security (SNS) 1.0.0 through 4.2.3 allows a Denial of Service.
CVE-2021-28096 1 Stormshield 1 Stormshield Network Security 2022-02-04 4.3 MEDIUM 5.3 MEDIUM
An issue was discovered in Stormshield SNS before 4.2.3 (when the proxy is used). An attacker can saturate the proxy connection table. This would result in the proxy denying any new connections.
CVE-2022-22703 2 Microsoft, Stormshield 2 Windows, Network Security 2022-01-24 2.1 LOW 5.5 MEDIUM
In Stormshield SSO Agent 2.x before 2.1.1 and 3.x before 3.0.2, the cleartext user password and PSK are contained in the log file of the .exe installer.
CVE-2020-8430 1 Stormshield 1 Stormshield Network Security 2021-06-22 5.8 MEDIUM 6.1 MEDIUM
Stormshield Network Security 310 3.7.10 devices have an auth/lang.html?rurl= Open Redirect vulnerability on the captive portal. For example, the attacker can use rurl=//example.com instead of rurl=https://example.com in the query string.
CVE-2021-3384 1 Stormshield 1 Network Security 2021-03-09 5.0 MEDIUM 5.3 MEDIUM
A vulnerability in Stormshield Network Security could allow an attacker to trigger a protection related to ARP/NDP tables management, which would temporarily prevent the system to contact new hosts via IPv4 or IPv6. This affects versions 2.0.0 to 2.7.7, 2.8.0 to 2.16.0, 3.0.0 to 3.7.16, 3.8.0 to 3.11.4, and 4.0.0 to 4.1.5. Fixed in versions 2.7.8, 3.7.17, 3.11.5, and 4.2.0.