SES Evolution server access check bypass (CVE-2021-31220)

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2021-022 CVE-2021-31220 04/06/2021 medium v1

Vulnerability details

SES Evolution before 2.1.0 allows modifying security policies by leveraging access of a user having read-only access to security policies.

Impacted products

ProductsSeverityDetail
Stormshield Endpoint Security medium SES is impacted

Revisions

Version Date Description
v1  07/12/2021 Initial release


Stormshield Endpoint Security

CVSS v3.1 Overall Score: 6.7      

Analysis

Impacted version

An attacker may trick a user having read-only access to SES Evolution security policies to execute a malicious program in order to update an existing security policy with malicious contents. This policy will eventually be used the next time changes are deployed to the environment.

  • SES Evolution 2.0.0 to 2.0.2

Workaround solution

Solution

There is no workaround solution.

The 2.1.0 update fixes this vulnerability.



Attack Vector Attack Complexity Privileges Required User Interaction Scope Confidentiality Impact Integrity Impact Availability impact
Adjacent Network Low Low Required Unchanged High High High
CVSS Base score: 7.4 CVSS Vector: (AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)
Exploit Code Maturity Remediation Level Report Confidence
Proof of concept code Official fix Confirmed
CVSS Temporal score: 6.7 CVSS Vector: (AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
Confidentiality Requirement Integrity Requirement Availability Requirement
High High High
CVSS Environmental score: 6.7 CVSS Vector: (AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X)