D(HE)ater vulnerability on HTTPS
Vulnerability details
The https algorithm selection can leads to a high CPU consumption.
Impacted products
Revisions
Version |
Date |
Description |
v1 |
02/21/2023 |
Initial release |
Stormshield Network Security |
CVSS v3.1 Overall Score: 5.5 
|
Analysis
|
Impacted version
|
The https algorithm selection can leads to a high CPU consumption.
|
- SNS 2.7.0 to 4.3.16
- SNS 4.4.0 to 4.6.3
|
Workaround solution
|
Solution
|
There is no workaround solution.
|
The following versions fix this vulnerability
|
Attack Vector |
Attack Complexity |
Privileges Required |
User Interaction |
Scope |
Confidentiality Impact |
Integrity Impact |
Availability impact |
Network |
Low |
None |
None |
Unchanged |
None |
None |
Low |
Exploit Code Maturity |
Remediation Level |
Report Confidence |
Proof of concept code |
Official fix |
Confirmed |
Confidentiality Requirement |
Integrity Requirement |
Availability Requirement |
High |
High |
High |