SMC Strong authentication
Advisory ID | CVE Number | Date discovered | Severity | Advisory revision |
---|---|---|---|---|
STORM-2019-019 | 05/09/2019 | high | v1 |
Vulnerability details
An attacker can guess an administrator’s password because SMC does not implement password complexity policy.
Impacted products
Products | Severity | Detail |
---|---|---|
Stormshield Network Security | high | fixed |
Revisions
Version | Date | Description |
---|---|---|
v1 | Initial release |
Stormshield Network Security |
CVSS v2 Overall Score: 8.7 |
Analysis |
Impacted version |
This is a very simple but handcrafted attack, because attacker needs to try to login manually in order to guess a password. |
|
Workaround solution |
Solution |
Ask to administrators to use strong passwords. |
The 2.6.2 update will fix this vulnerability. |
Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
---|---|---|---|---|---|
Network | Low | None | Complete | Partial | Partial |
CVSS Base score: 9 | CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:P/A:P) |
Exploitability | Remediation Level | Report Confidence |
---|---|---|
High | Official fix | Confirmed |
CVSS Temporal score: 7.8 | CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:P/A:P/E:H/RL:OF/RC:C) |
Collateral Damage Potential | Target Distribution |
---|---|
Medium-High | High [76-100%] |
CVSS Environmental score: 8.7 | CVSS Vector: (AV:N/AC:L/Au:N/C:C/I:P/A:P/E:H/RL:OF/RC:C/CDP:MH/TD:H/CR:ND/IR:ND/AR:ND) |