SMC CSRF
Advisory ID |
CVE Number |
Date discovered |
Severity |
Advisory revision |
STORM-2019-025 |
|
05/09/2019 |
medium |
v1 |
Vulnerability details
An attacker might forge requests to modify SMC data if an administrator navigate on attacker site while having a logged session.
Impacted products
Revisions
Version |
Date |
Description |
v1 |
|
Initial release |
Stormshield Network Security |
CVSS v2 Overall Score: 6.7
|
Analysis
|
Impacted version
|
Attack is unlikely on modern environments, due to well structurated SMC API.
So CORS policy headers have been hardened.
|
|
Workaround solution
|
Solution
|
Maintaining an up-to-date environment.
|
The 2.6.2 update will fix this vulnerability.
|
Access vector |
Access complexity |
Authentication |
Confidentiality impact |
Integrity impact |
Availability impact |
Network |
High |
Single |
Complete |
Partial |
Partial |
Exploitability |
Remediation Level |
Report Confidence |
Unproven that exploit exists |
Official fix |
Confirmed |
Collateral Damage Potential |
Target Distribution |
Medium-High |
High [76-100%] |