SES Evolution remote code execution (CVE-2021-45090)

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2021-070 CVE-2021-45090 11/16/2021 high v1

Vulnerability details

An unspecified vulnerability in SES Evolution could allow an unauthenticated user to take control of the system.

Impacted products

ProductsSeverityDetail
Stormshield Endpoint Security high SES is impacted

Revisions

Version Date Description
v1  12/21/2021 Initial release

 



Stormshield Endpoint Security

CVSS v3.1 Overall Score: 7.7      

Analysis

Impacted version

An attacker on the administration network could execute arbitrary code on the SES Evolution server.

  • SES 2.0.0 to 2.1.1

Workaround solution

Solution

There is no workaround solution.

The 2.1.2 update fixes this vulnerability.



Attack Vector Attack Complexity Privileges Required User Interaction Scope Confidentiality Impact Integrity Impact Availability impact
Adjacent Network Low None None Unchanged High High High
CVSS Base score: 8.8 CVSS Vector: (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Exploit Code Maturity Remediation Level Report Confidence
Unproven that exploit exists Official fix Confirmed
CVSS Temporal score: 7.7 CVSS Vector: (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Confidentiality Requirement Integrity Requirement Availability Requirement
High High High
CVSS Environmental score: 7.7 CVSS Vector: (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X)