Excessive time spent checking DSA keys and parameters

Advisory ID CVE Number Date discovered Severity Advisory revision
STORM-2024-023 CVE-2024-4603 05/16/2024 medium v1

Vulnerability details

Checking excessively long DSA keys or parameters may be very slow

Impacted products

ProductsSeverityDetail
Stormshield Management Center medium SMC is impacted

Revisions

Version Date Description
v1 Initial release


Stormshield Management Center

CVSS v3.1 Overall Score: 5      

Analysis

Impacted version

An attacker who has access to the SMC console can use the openSSL command with the correct options and cause a denial of service.

  • SMC < 3.6.0

Workaround solution

Solution

There is no workaround solution.

The 3.6.0 update will fix this vulnerability.



Attack Vector Attack Complexity Privileges Required User Interaction Scope Confidentiality Impact Integrity Impact Availability impact
Local Low High None Unchanged None None High
CVSS Base score: 4.4 CVSS Vector: (AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)
Exploit Code Maturity Remediation Level Report Confidence
Unproven that exploit exists Official fix Unknown
CVSS Temporal score: 3.5 CVSS Vector: (AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:U)
Confidentiality Requirement Integrity Requirement Availability Requirement
Medium High High
CVSS Environmental score: 5 CVSS Vector: (AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:U/CR:M/IR:H/AR:H/MAV:X/MAC:X/MPR:X/MUI:X/MS:X/MC:X/MI:X/MA:X)