D(HE)ater vulnerability on SSH

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2023-005 CVE-2002-20001 02/11/2022 medium v3

Vulnerability details

The SSH algorithm selection can leads to a high CPU consumption.

Impacted products

ProductsSeverityDetail
Stormshield Network Security medium SNS is impacted

Revisions

Version Date Description
v1 02/21/2023 Initial release
v2 05/02/2023 Add EAL version
v3 08/31/2023 Edit impacted versions


Stormshield Network Security

CVSS v3.1 Overall Score: 5.5      

Analysis

Impacted version

The SSH algorithm selection can leads to a high CPU consumption.

  • SNS 2.7.0 to 4.3.15
  • SNS 4.4.0 to 4.6.3

Workaround solution

Solution

There is no workaround solution.

The following versions fix this vulnerability

  • 4.3.12.1
  • 4.3.16
  • 4.6.3
  • 4.7.0


Attack Vector Attack Complexity Privileges Required User Interaction Scope Confidentiality Impact Integrity Impact Availability impact
Network Low None None Unchanged None None Low
CVSS Base score: 5.3 CVSS Vector: (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploit Code Maturity Remediation Level Report Confidence
Proof of concept code Official fix Confirmed
CVSS Temporal score: 4.8 CVSS Vector: (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C)
Confidentiality Requirement Integrity Requirement Availability Requirement
High High High
CVSS Environmental score: 5.5 CVSS Vector: (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C/CR:H/IR:H/AR:H/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X)