LDAP User/Password Enumeration on the captive portal

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2021-006 CVE-2021-28127 03/10/2021 high v3

Vulnerability details

If the authentication captive portal uses an external LDAP service, a bruteforce-type attack can lead to a user/password enumeration

Impacted products

ProductsSeverityDetail
Stormshield Network Security high SNS is impacted

Revisions

Version Date Description
v1 05/27/2021 Initial release
v2 06/30/2021 Update description and CVSS score
v3 01/31/2022 Update CVSS score

 



Stormshield Network Security

CVSS v3.1 Overall Score: 7.5      

Analysis

Impacted version

By using a bruteforce attack on the captive portal, an attacker can list the users/passwords from the external LDAP server.

  • SNS 2.0.0 to 2.7.9
  • SNS 2.8.0 to 2.16.0
  • SNS 3.0.0 to 3.7.19
  • SNS 3.8.0 to 3.11.7
  • SNS 4.0.0 to 4.1.5
  • SNS 4.2.1

Workaround solution

Solution

There is no workaround solution.

The vulnerability is fixed in versions

  • 3.7.20
  • 3.11.8
  • 4.1.6
  • 4.2.2

 



Attack Vector Attack Complexity Privileges Required User Interaction Scope Confidentiality Impact Integrity Impact Availability impact
Adjacent Network Low None None Unchanged High None None
CVSS Base score: 6.5 CVSS Vector: (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
Exploit Code Maturity Remediation Level Report Confidence
Proof of concept code Official fix Confirmed
CVSS Temporal score: 5.9 CVSS Vector: (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C)
Confidentiality Requirement Integrity Requirement Availability Requirement
High Low Low
CVSS Environmental score: 7.5 CVSS Vector: (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C/CR:H/IR:L/AR:L/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X)