SMC Strong authentication

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2019-019 05/09/2019 high v1

Vulnerability details

An attacker can guess an administrator’s password because SMC does not implement password complexity policy.

Impacted products

ProductsSeverityDetail
Stormshield Network Security high fixed

Revisions

Version Date Description
v1 Initial release


Stormshield Network Security

CVSS v2 Overall Score: 8.7      

Analysis

Impacted version

This is a very simple but handcrafted attack, because attacker needs to try to login manually in order to guess a password.

  • SMC 1.0.0 to 2.6.1

Workaround solution

Solution

Ask to administrators to use strong passwords.

The 2.6.2 update will fix this vulnerability.



Access vector Access complexity Authentication Confidentiality impact Integrity impact Availability impact
Network Low None Complete Partial Partial
CVSS Base score: 9 CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:P/A:P)
Exploitability Remediation Level Report Confidence
High Official fix Confirmed
CVSS Temporal score: 7.8 CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:P/A:P/E:H/RL:OF/RC:C)
Collateral Damage Potential Target Distribution
Medium-High High [76-100%]
CVSS Environmental score: 8.7 CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:P/A:P/E:H/RL:OF/RC:C/CDP:MH/TD:H/CR:ND/IR:ND/AR:ND)