Password disclosure risks in Serverd log files

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2023-006 CVE-2023-28616 12/30/2022 low v2

Vulnerability details

Passwords with “=” or ” ” characters are logged in plaintext by serverd.

Impacted products

Stormshield Network Security low SNS is impacted


Version Date Description
v1 04/11/2023 Reserved Publication
v2 12/22/2023 Updated and disclosed

Stormshield Network Security

CVSS v3.1 Overall Score: 3.9      


Impacted version

Serverd logs passwords with “=” and ” ” characters in plaintext. If those log files are sent to Syslog server the passwords can be retrieved.

  • SNS 2.7 to 4.3.16
  • SNS 4.4.0 to 4.6.3
  • SNS 4.7.0

Workaround solution


Avoid to use “=” and ” ” characters in passwords

The following versions fix this vulnerability

  • 4.3.17
  • 4.6.4
  • 4.7.1

Attack Vector Attack Complexity Privileges Required User Interaction Scope Confidentiality Impact Integrity Impact Availability impact
Adjacent Network Low None None Unchanged Low None None
CVSS Base score: 4.3 CVSS Vector: (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploit Code Maturity Remediation Level Report Confidence
Proof of concept code Official fix Confirmed
CVSS Temporal score: 3.9 CVSS Vector: (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C)
Confidentiality Requirement Integrity Requirement Availability Requirement
Medium Low Low
CVSS Environmental score: 3.9 CVSS Vector: (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C/CR:M/IR:L/AR:L/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X)