DoS on SNS Proxy
Vulnerability details
Risk of Deny of Service attack on the SNS proxy.
Impacted products
Revisions
Version |
Date |
Description |
v1 |
08/25/2021 |
Initial release |
V2 |
06/10/2021 |
Update Fix versions |
Stormshield Network Security |
CVSS v3.1 Overall Score: 4
|
Analysis
|
Impacted version
|
An attacker can saturate the proxy connection table, which would result in the proxy denying any new connections.
No impact if the Proxy is not used.
|
- SNS 2.0.0 to 2.7.8
- SNS 3.7.6 to 3.7.20
- SNS 3.8.0 to 3.11.8
- SNS 4.0.1 to 4.2.2
|
Workaround solution
|
Solution
|
If you don’t use the proxy you are not impacted.
Apply QOS on the filtering rules that concern your proxyfied traffic.
If your proxy seems to be affected you can unstuck new connections by rebooting your proxy with `nrestart tproxyd`
|
The vulnerability is fixed in versions
|
Attack Vector |
Attack Complexity |
Privileges Required |
User Interaction |
Scope |
Confidentiality Impact |
Integrity Impact |
Availability impact |
Adjacent Network |
Low |
None |
None |
Unchanged |
None |
None |
Low |
Exploit Code Maturity |
Remediation Level |
Report Confidence |
Unproven that exploit exists |
Official fix |
Unknown |
Confidentiality Requirement |
Integrity Requirement |
Availability Requirement |
Low |
Low |
High |
Netasq |
CVSS v3.1 Overall Score: 4
|
Analysis
|
Impacted version
|
An attacker can saturate the proxy connection table, which would result in the proxy denying any new connections.
|
|
Workaround solution
|
Solution
|
If you don’t use the proxy you are not impacted.
Apply QOS on the filtering rules that concern your proxyfied traffic.
If your proxy seems to be affected you can unstuck new connections by rebooting your proxy with `nrestart tproxyd`
|
There is no solution
|
Attack Vector |
Attack Complexity |
Privileges Required |
User Interaction |
Scope |
Confidentiality Impact |
Integrity Impact |
Availability impact |
Adjacent Network |
Low |
None |
None |
Unchanged |
None |
None |
Low |
Exploit Code Maturity |
Remediation Level |
Report Confidence |
Unproven that exploit exists |
Official fix |
Unknown |
Confidentiality Requirement |
Integrity Requirement |
Availability Requirement |
Low |
Low |
High |