Vulnerabilities (CVE)

Filtered by vendor Stormshield Subscribe
Filtered by product Stormshield Network Security
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2002-20001 6 Balasys, F5, Hpe and 3 more 49 Dheater, Big-ip Access Policy Manager, Big-ip Advanced Firewall Manager and 46 more 2024-01-11 5.0 MEDIUM 7.5 HIGH
The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.
CVE-2023-41166 1 Stormshield 1 Stormshield Network Security 2023-12-29 N/A 5.3 MEDIUM
An issue was discovered in Stormshield Network Security (SNS) 3.7.0 through 3.7.39, 3.11.0 through 3.11.27, 4.3.0 through 4.3.22, 4.6.0 through 4.6.9, and 4.7.0 through 4.7.1. It's possible to know if a specific user account exists on the SNS firewall by using remote access commands.
CVE-2023-47093 1 Stormshield 1 Stormshield Network Security 2023-12-29 N/A 6.5 MEDIUM
An issue was discovered in Stormshield Network Security (SNS) 4.0.0 through 4.3.21, 4.4.0 through 4.6.8, and 4.7.0. Sending a crafted ICMP packet may lead to a crash of the ASQ engine.
CVE-2022-4304 2 Openssl, Stormshield 4 Openssl, Endpoint Security, Sslvpn and 1 more 2023-08-08 N/A 5.9 MEDIUM
A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.
CVE-2021-31814 1 Stormshield 1 Stormshield Network Security 2023-08-08 3.6 LOW 6.1 MEDIUM
In Stormshield 1.1.0, and 2.1.0 through 2.9.0, an attacker can block a client from accessing the VPN and can obtain sensitive information through the SN VPN SSL Client.
CVE-2021-3398 1 Stormshield 1 Stormshield Network Security 2022-02-23 5.0 MEDIUM 5.8 MEDIUM
Stormshield Network Security (SNS) 3.x has an Integer Overflow in the high-availability component.
CVE-2021-37613 1 Stormshield 1 Stormshield Network Security 2022-02-17 2.9 LOW 6.5 MEDIUM
Stormshield Network Security (SNS) 1.0.0 through 4.2.3 allows a Denial of Service.
CVE-2021-28096 1 Stormshield 1 Stormshield Network Security 2022-02-04 4.3 MEDIUM 5.3 MEDIUM
An issue was discovered in Stormshield SNS before 4.2.3 (when the proxy is used). An attacker can saturate the proxy connection table. This would result in the proxy denying any new connections.
CVE-2021-28127 1 Stormshield 1 Stormshield Network Security 2021-07-07 5.0 MEDIUM 7.5 HIGH
An issue was discovered in Stormshield SNS through 4.2.1. A brute-force attack can occur.
CVE-2020-8430 1 Stormshield 1 Stormshield Network Security 2021-06-22 5.8 MEDIUM 6.1 MEDIUM
Stormshield Network Security 310 3.7.10 devices have an auth/lang.html?rurl= Open Redirect vulnerability on the captive portal. For example, the attacker can use rurl=//example.com instead of rurl=https://example.com in the query string.
CVE-2018-20850 1 Stormshield 1 Stormshield Network Security 2019-07-08 7.2 HIGH 8.2 HIGH
Stormshield Network Security 2.0.0 through 2.13.0 and 3.0.0 through 3.7.1 has self-XSS in the command line interface of the SNS web server.