SMC – Cookie session ID renew

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2020-009 01/13/2020 medium v1

Vulnerability details

Once authenticating, a new session isn’t created server side. The previous session ID defined in the client session cookie remains as an authenticated session.

Impacted products

ProductsSeverityDetail
Stormshield Network Security medium Fixed

Revisions

Version Date Description
v1 Initial release


Stormshield Network Security

CVSS v2 Overall Score: 6.9      

Analysis

Impacted version

Renew of the unauthenticated session cookie when administrator authenticate on SMC instead of passing the cookie to authenticated server-side.

SMC < 2.6.4

Workaround solution

Solution

The usage of a browser in private session prevent session theft.

The SMC 2.6.4 update will fix this vulnerability.



Access vector Access complexity Authentication Confidentiality impact Integrity impact Availability impact
Network High None Complete Partial None
CVSS Base score: 6.1 CVSS Vector: (AV:N/AC:H/Au:N/C:C/I:P/A:N)
Exploitability Remediation Level Report Confidence
Proof of concept code Official fix Confirmed
CVSS Temporal score: 4.8 CVSS Vector: (AV:N/AC:H/Au:N/C:C/I:P/A:N/E:POC/RL:OF/RC:C)
Collateral Damage Potential Target Distribution
Medium-High High [76-100%]
CVSS Environmental score: 6.9 CVSS Vector: (AV:N/AC:H/Au:N/C:C/I:P/A:N/E:POC/RL:OF/RC:C/CDP:MH/TD:H/CR:ND/IR:ND/AR:ND)