SMC – Cookie session ID renew
Advisory ID | CVE Number | Date discovered | Severity | Advisory revision |
---|---|---|---|---|
STORM-2020-009 | 01/13/2020 | medium | v1 |
Vulnerability details
Once authenticating, a new session isn’t created server side. The previous session ID defined in the client session cookie remains as an authenticated session.
Impacted products
Products | Severity | Detail |
---|---|---|
Stormshield Network Security | medium | Fixed |
Revisions
Version | Date | Description |
---|---|---|
v1 | Initial release |
Stormshield Network Security |
CVSS v2 Overall Score: 6.9 |
Analysis |
Impacted version |
Renew of the unauthenticated session cookie when administrator authenticate on SMC instead of passing the cookie to authenticated server-side. |
SMC < 2.6.4 |
Workaround solution |
Solution |
The usage of a browser in private session prevent session theft. |
The SMC 2.6.4 update will fix this vulnerability. |
Access vector | Access complexity | Authentication | Confidentiality impact | Integrity impact | Availability impact |
---|---|---|---|---|---|
Network | High | None | Complete | Partial | None |
CVSS Base score: 6.1 | CVSS Vector: (AV:N/AC:H/Au:N/C:C/I:P/A:N) |
Exploitability | Remediation Level | Report Confidence |
---|---|---|
Proof of concept code | Official fix | Confirmed |
CVSS Temporal score: 4.8 | CVSS Vector: (AV:N/AC:H/Au:N/C:C/I:P/A:N/E:POC/RL:OF/RC:C) |
Collateral Damage Potential | Target Distribution |
---|---|
Medium-High | High [76-100%] |
CVSS Environmental score: 6.9 | CVSS Vector: (AV:N/AC:H/Au:N/C:C/I:P/A:N/E:POC/RL:OF/RC:C/CDP:MH/TD:H/CR:ND/IR:ND/AR:ND) |