LDAP User/Password Enumeration on the captive portal
Vulnerability details
If the authentication captive portal uses an external LDAP service, a bruteforce-type attack can lead to a user/password enumeration
Impacted products
Revisions
Version |
Date |
Description |
v1 |
05/27/2021 |
Initial release |
v2 |
06/30/2021 |
Update description and CVSS score |
v3 |
01/31/2022 |
Update CVSS score |
Stormshield Network Security |
CVSS v3.1 Overall Score: 7.5 
|
Analysis
|
Impacted version
|
By using a bruteforce attack on the captive portal, an attacker can list the users/passwords from the external LDAP server.
|
- SNS 2.0.0 to 2.7.9
- SNS 2.8.0 to 2.16.0
- SNS 3.0.0 to 3.7.19
- SNS 3.8.0 to 3.11.7
- SNS 4.0.0 to 4.1.5
- SNS 4.2.1
|
Workaround solution
|
Solution
|
There is no workaround solution.
|
The vulnerability is fixed in versions
- 3.7.20
- 3.11.8
- 4.1.6
- 4.2.2
|
Attack Vector |
Attack Complexity |
Privileges Required |
User Interaction |
Scope |
Confidentiality Impact |
Integrity Impact |
Availability impact |
Adjacent Network |
Low |
None |
None |
Unchanged |
High |
None |
None |
Exploit Code Maturity |
Remediation Level |
Report Confidence |
Proof of concept code |
Official fix |
Confirmed |
Confidentiality Requirement |
Integrity Requirement |
Availability Requirement |
High |
Low |
Low |