SES Evolution server access check bypass (CVE-2021-45091)
Vulnerability details
An unspecified vulnerability in SES Evolution could allow an authenticated user to forge some incorrect system logs.
Impacted products
Revisions
Version |
Date |
Description |
v1 |
12/21/2021 |
Initial release |
Stormshield Endpoint Security |
CVSS v3.1 Overall Score: 2 
|
Analysis
|
Impacted version
|
An attacker may trick a user connected to a machine where the SES Evolution console is installed to execute a malicious program in order to forge some incorrect system logs.
|
|
Workaround solution
|
Solution
|
There is no workaround solution.
|
The 2.1.2 update fixes this vulnerability.
|
Attack Vector |
Attack Complexity |
Privileges Required |
User Interaction |
Scope |
Confidentiality Impact |
Integrity Impact |
Availability impact |
Adjacent Network |
Low |
Low |
Required |
Unchanged |
None |
Low |
None |
Exploit Code Maturity |
Remediation Level |
Report Confidence |
Unproven that exploit exists |
Official fix |
Confirmed |
Confidentiality Requirement |
Integrity Requirement |
Availability Requirement |
Low |
Low |
Low |