SES Evolution server access check bypass (CVE-2021-31225)

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2021-027 CVE-2021-31225 04/06/2021 low v1

Vulnerability details

SES Evolution before 2.1.0 allows deleting some resources not currently in use by any security policy by leveraging access to a computer having the administration console installed.

Impacted products

ProductsSeverityDetail
Stormshield Endpoint Security low SES is impacted

Revisions

Version Date Description
v1  07/12/2021 Initial release


Stormshield Endpoint Security

CVSS v3.1 Overall Score: 3.2      

Analysis

Impacted version

An attacker may trick a user connected to a machine where the SES Evolution console is installed to execute a malicious program in order to delete an existing script (executed when a malicious action is detected or to determine the security policy to apply). This is possible only if the script is not currently used.

  • SES 2.0.0 to 2.0.2

Workaround solution

Solution

There is no workaround solution.

The 2.1.0 update fixes this vulnerability.



Attack Vector Attack Complexity Privileges Required User Interaction Scope Confidentiality Impact Integrity Impact Availability impact
Adjacent Network Low None Required Unchanged None None Low
CVSS Base score: 3.5 CVSS Vector: (AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)
Exploit Code Maturity Remediation Level Report Confidence
Proof of concept code Official fix Confirmed
CVSS Temporal score: 3.2 CVSS Vector: (AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C)
Confidentiality Requirement Integrity Requirement Availability Requirement
Low Low Medium
CVSS Environmental score: 3.2 CVSS Vector: (AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C/CR:L/IR:L/AR:M/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X)