SMC CSRF

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2019-025 05/09/2019 medium v1

Vulnerability details

An attacker might forge requests to modify SMC data if an administrator navigate on attacker site while having a logged session.

Impacted products

ProductsSeverityDetail
Stormshield Network Security medium fixed

Revisions

Version Date Description
v1 Initial release


Stormshield Network Security

CVSS v2 Overall Score: 6.7      

Analysis

Impacted version

Attack is unlikely on modern environments, due to well structurated SMC API.

So CORS policy headers have been hardened.

  • SMC 1.0.0 to 2.6.1

Workaround solution

Solution

Maintaining an up-to-date environment.

The 2.6.2 update will fix this vulnerability.



Access vector Access complexity Authentication Confidentiality impact Integrity impact Availability impact
Network High Single Complete Partial Partial
CVSS Base score: 6.1 CVSS Vector: (AV:N/AC:H/Au:S/C:C/I:P/A:P)
Exploitability Remediation Level Report Confidence
Unproven that exploit exists Official fix Confirmed
CVSS Temporal score: 4.5 CVSS Vector: (AV:N/AC:H/Au:S/C:C/I:P/A:P/E:U/RL:OF/RC:C)
Collateral Damage Potential Target Distribution
Medium-High High [76-100%]
CVSS Environmental score: 6.7 CVSS Vector: (AV:N/AC:H/Au:S/C:C/I:P/A:P/E:U/RL:OF/RC:C/CDP:MH/TD:H/CR:ND/IR:ND/AR:ND)