Vulnerabilites related to stormshield - endpoint_security
Vulnerability from fkie_nvd
Published
2023-06-27 17:15
Modified
2024-11-21 08:08
Severity ?
Summary
Stormshield Endpoint Security Evolution 2.0.0 through 2.3.2 has Insecure Permissions. An interactive user can use the SES Evolution agent to create arbitrary files with local system privileges.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://advisories.stormshield.eu | Vendor Advisory | |
cve@mitre.org | https://advisories.stormshield.eu/2023-022/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu/2023-022/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
stormshield | endpoint_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAD1675D-5BA6-41EA-80B5-6EE0C638641D", "versionEndIncluding": "2.3.2", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stormshield Endpoint Security Evolution 2.0.0 through 2.3.2 has Insecure Permissions. An interactive user can use the SES Evolution agent to create arbitrary files with local system privileges." } ], "id": "CVE-2023-35799", "lastModified": "2024-11-21T08:08:43.930", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-27T17:15:10.110", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2023-022/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2023-022/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-06-27 17:15
Modified
2024-11-21 08:08
Severity ?
Summary
Stormshield Endpoint Security Evolution 2.0.0 through 2.4.2 has Insecure Permissions. An ACL entry on the SES Evolution agent directory that contains the agent logs displayed in the GUI allows interactive users to read data, which could allow access to information reserved to administrators.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://advisories.stormshield.eu | Vendor Advisory | |
cve@mitre.org | https://advisories.stormshield.eu/2023-021/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu/2023-021/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
stormshield | endpoint_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "24E99B5B-053C-424F-83C4-8C500831E20C", "versionEndIncluding": "2.4.2", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stormshield Endpoint Security Evolution 2.0.0 through 2.4.2 has Insecure Permissions. An ACL entry on the SES Evolution agent directory that contains the agent logs displayed in the GUI allows interactive users to read data, which could allow access to information reserved to administrators." } ], "id": "CVE-2023-35800", "lastModified": "2024-11-21T08:08:44.080", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-06-27T17:15:10.170", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2023-021/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2023-021/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-13 14:15
Modified
2024-11-21 06:05
Severity ?
Summary
SES Evolution before 2.1.0 allows updating some parts of a security policy by leveraging access to a computer having the administration console installed.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://advisories.stormshield.eu | Vendor Advisory | |
cve@mitre.org | https://advisories.stormshield.eu/2021-024/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu/2021-024/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
stormshield | endpoint_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "546EF33E-EFFC-4842-9A48-DF3FBFB6648C", "versionEndIncluding": "2.0.2", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SES Evolution before 2.1.0 allows updating some parts of a security policy by leveraging access to a computer having the administration console installed." }, { "lang": "es", "value": "SES Evolution versiones anteriores a 2.1.0, permite actualizar algunas partes de una pol\u00edtica de seguridad al aprovechar el acceso a un ordenador que tenga instalada la consola de administraci\u00f3n" } ], "id": "CVE-2021-31222", "lastModified": "2024-11-21T06:05:19.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-13T14:15:08.680", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-024/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-024/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-30 20:15
Modified
2025-01-14 17:15
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control: authenticated users can read sensitive information.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://advisories.stormshield.eu | Vendor Advisory | |
cve@mitre.org | https://advisories.stormshield.eu/2023-001/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu/2023-001/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
stormshield | endpoint_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1F16AFF-A52B-42DE-A4D5-7C4CC7F32C90", "versionEndExcluding": "2.4.1", "versionStartIncluding": "2.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control: authenticated users can read sensitive information." } ], "id": "CVE-2023-23561", "lastModified": "2025-01-14T17:15:09.487", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-05-30T20:15:10.130", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2023-001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2023-001/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2021-12-21 16:15
Modified
2024-11-21 06:31
Severity ?
Summary
Stormshield Endpoint Security 2.x before 2.1.2 has Incorrect Access Control.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://advisories.stormshield.eu/2021-071/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu/2021-071/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
stormshield | endpoint_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C05A885-EC16-4DA0-AEF0-C38EC7BBF4E4", "versionEndExcluding": "2.1.2", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stormshield Endpoint Security 2.x before 2.1.2 has Incorrect Access Control." }, { "lang": "es", "value": "Stormshield Endpoint Security versiones 2.x anteriores a 2.1.2 , presenta un Control de Acceso Incorrecto" } ], "id": "CVE-2021-45089", "lastModified": "2024-11-21T06:31:55.813", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 2.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-21T16:15:10.527", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-071/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-071/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-08 20:15
Modified
2025-02-13 17:15
Severity ?
Summary
A timing based side channel exists in the OpenSSL RSA Decryption implementation
which could be sufficient to recover a plaintext across a network in a
Bleichenbacher style attack. To achieve a successful decryption an attacker
would have to be able to send a very large number of trial messages for
decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5,
RSA-OEAP and RSASVE.
For example, in a TLS connection, RSA is commonly used by a client to send an
encrypted pre-master secret to the server. An attacker that had observed a
genuine connection between a client and a server could use this flaw to send
trial messages to the server and record the time taken to process them. After a
sufficiently large number of messages the attacker could recover the pre-master
secret used for the original connection and thus be able to decrypt the
application data sent over that connection.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "matchCriteriaId": "70985D55-A574-4151-B451-4D500CBFC29A", "versionEndExcluding": "1.0.2zg", "versionStartIncluding": "1.0.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "matchCriteriaId": "DE0061D6-8F81-45D3-B254-82A94915FD08", "versionEndExcluding": "1.1.1t", "versionStartIncluding": "1.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6DC5D88-4E99-48F2-8892-610ACA9B5B86", "versionEndExcluding": "3.0.8", "versionStartIncluding": "3.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "166DF690-041D-4585-A9DA-A6CC72A6A7F3", "versionEndExcluding": "7.2.40", "vulnerable": true }, { "criteria": "cpe:2.3:a:stormshield:sslvpn:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA7E0DD2-D62E-4735-A2C9-47C463BE4AA9", "versionEndExcluding": "3.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "27B77023-4983-4D33-9824-A120A5ED31BD", "versionEndExcluding": "2.7.11", "versionStartIncluding": "2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BD398C8-BC0B-4ED5-B71A-B9C6D8F63659", "versionEndExcluding": "3.7.34", "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "31B59634-B59C-4391-96D3-200A86A6CE3E", "versionEndExcluding": "3.11.22", "versionStartIncluding": "3.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7794B42-8235-4C75-866F-5D0A405F0989", "versionEndExcluding": "4.3.16", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8A23A5D-928A-4225-9C93-31E5DFE215A7", "versionEndExcluding": "4.6.3", "versionStartIncluding": "4.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A timing based side channel exists in the OpenSSL RSA Decryption implementation\nwhich could be sufficient to recover a plaintext across a network in a\nBleichenbacher style attack. To achieve a successful decryption an attacker\nwould have to be able to send a very large number of trial messages for\ndecryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5,\nRSA-OEAP and RSASVE.\n\nFor example, in a TLS connection, RSA is commonly used by a client to send an\nencrypted pre-master secret to the server. An attacker that had observed a\ngenuine connection between a client and a server could use this flaw to send\ntrial messages to the server and record the time taken to process them. After a\nsufficiently large number of messages the attacker could recover the pre-master\nsecret used for the original connection and thus be able to decrypt the\napplication data sent over that connection." } ], "id": "CVE-2022-4304", "lastModified": "2025-02-13T17:15:50.490", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-02-08T20:15:23.887", "references": [ { "source": "openssl-security@openssl.org", "url": "https://security.gentoo.org/glsa/202402-08" }, { "source": "openssl-security@openssl.org", "tags": [ "Vendor Advisory" ], "url": "https://www.openssl.org/news/secadv/20230207.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/202402-08" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.openssl.org/news/secadv/20230207.txt" } ], "sourceIdentifier": "openssl-security@openssl.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-13 14:15
Modified
2024-11-21 06:05
Severity ?
Summary
SES Evolution before 2.1.0 allows deleting some parts of a security policy by leveraging access to a computer having the administration console installed.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://advisories.stormshield.eu | Vendor Advisory | |
cve@mitre.org | https://advisories.stormshield.eu/2021-023/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu/2021-023/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
stormshield | endpoint_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "546EF33E-EFFC-4842-9A48-DF3FBFB6648C", "versionEndIncluding": "2.0.2", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SES Evolution before 2.1.0 allows deleting some parts of a security policy by leveraging access to a computer having the administration console installed." }, { "lang": "es", "value": "SES Evolution versiones anteriores a 2.1.0, permite eliminar algunas partes de una pol\u00edtica de seguridad al aprovechar el acceso a un ordenador que tenga instalada la consola de administraci\u00f3n" } ], "id": "CVE-2021-31221", "lastModified": "2024-11-21T06:05:19.553", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-13T14:15:08.650", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-023/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-023/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-31 01:15
Modified
2025-01-10 17:15
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Summary
Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control that allows an authenticated user can update global parameters.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://advisories.stormshield.eu | Vendor Advisory | |
cve@mitre.org | https://advisories.stormshield.eu/2023-002/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu/2023-002/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
stormshield | endpoint_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1F16AFF-A52B-42DE-A4D5-7C4CC7F32C90", "versionEndExcluding": "2.4.1", "versionStartIncluding": "2.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control that allows an authenticated user can update global parameters." } ], "id": "CVE-2023-23562", "lastModified": "2025-01-10T17:15:10.537", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-05-31T01:15:43.057", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2023-002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2023-002/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-12-21 16:15
Modified
2024-11-21 06:31
Severity ?
Summary
Stormshield Endpoint Security from 2.1.0 to 2.1.1 has Incorrect Access Control.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://advisories.stormshield.eu/2021-072/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu/2021-072/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
stormshield | endpoint_security | 2.1.0 | |
stormshield | endpoint_security | 2.1.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stormshield:endpoint_security:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "E155A73F-9899-48CD-AB0D-9B2D56CA51AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:stormshield:endpoint_security:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "A42B788B-87AE-4F9A-A15D-77E2E2A14F96", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stormshield Endpoint Security from 2.1.0 to 2.1.1 has Incorrect Access Control." }, { "lang": "es", "value": "Stormshield Endpoint Security desde la versi\u00f3n 2.1.0 a 2.1.1, presenta un Control de Acceso Incorrecto" } ], "id": "CVE-2021-45091", "lastModified": "2024-11-21T06:31:56.137", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-21T16:15:10.610", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-072/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-072/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-13 14:15
Modified
2024-11-21 06:05
Severity ?
Summary
SES Evolution before 2.1.0 allows modifying security policies by leveraging access of a user having read-only access to security policies.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://advisories.stormshield.eu | Vendor Advisory | |
cve@mitre.org | https://advisories.stormshield.eu/2021-022/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu/2021-022/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
stormshield | endpoint_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "546EF33E-EFFC-4842-9A48-DF3FBFB6648C", "versionEndIncluding": "2.0.2", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SES Evolution before 2.1.0 allows modifying security policies by leveraging access of a user having read-only access to security policies." }, { "lang": "es", "value": "SES Evolution versiones anteriores a 2.1.0, permite c al aprovechar el acceso de un usuario que tenga acceso de s\u00f3lo lectura a las pol\u00edticas de seguridad" } ], "id": "CVE-2021-31220", "lastModified": "2024-11-21T06:05:19.410", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.4, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-13T14:15:08.617", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-022/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-022/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-12-21 16:15
Modified
2024-11-21 06:31
Severity ?
Summary
Stormshield Endpoint Security before 2.1.2 allows remote code execution.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://advisories.stormshield.eu/2021-070/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu/2021-070/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
stormshield | endpoint_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C05A885-EC16-4DA0-AEF0-C38EC7BBF4E4", "versionEndExcluding": "2.1.2", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stormshield Endpoint Security before 2.1.2 allows remote code execution." }, { "lang": "es", "value": "Stormshield Endpoint Security versiones anteriores a 2.1.2, permite una ejecuci\u00f3n de c\u00f3digo remota" } ], "id": "CVE-2021-45090", "lastModified": "2024-11-21T06:31:55.987", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-21T16:15:10.570", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-070/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-070/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-13 14:15
Modified
2024-11-21 06:05
Severity ?
Summary
SES Evolution before 2.1.0 allows reading some parts of a security policy by leveraging access to a computer having the administration console installed.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://advisories.stormshield.eu | Vendor Advisory | |
cve@mitre.org | https://advisories.stormshield.eu/2021-025/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu/2021-025/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
stormshield | endpoint_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "546EF33E-EFFC-4842-9A48-DF3FBFB6648C", "versionEndIncluding": "2.0.2", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SES Evolution before 2.1.0 allows reading some parts of a security policy by leveraging access to a computer having the administration console installed." }, { "lang": "es", "value": "SES Evolution versiones anteriores a 2.1.0, permite leer algunas partes de una pol\u00edtica de seguridad al aprovechar el acceso a un ordenador que tenga instalada la consola de administraci\u00f3n" } ], "id": "CVE-2021-31223", "lastModified": "2024-11-21T06:05:19.840", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-13T14:15:08.710", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-025/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-025/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-13 14:15
Modified
2024-11-21 06:12
Severity ?
Summary
Stormshield Endpoint Security Evolution 2.0.0 through 2.0.2 does not accomplish the intended defense against local administrators who can replace the Visual C++ runtime DLLs (in %WINDIR%\system32) with malicious ones.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://advisories.stormshield.eu | Vendor Advisory | |
cve@mitre.org | https://advisories.stormshield.eu/2021-045/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu/2021-045/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
stormshield | endpoint_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "546EF33E-EFFC-4842-9A48-DF3FBFB6648C", "versionEndIncluding": "2.0.2", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stormshield Endpoint Security Evolution 2.0.0 through 2.0.2 does not accomplish the intended defense against local administrators who can replace the Visual C++ runtime DLLs (in %WINDIR%\\system32) with malicious ones." }, { "lang": "es", "value": "Stormshield Endpoint Security Evolution versiones 2.0.0 hasta 2.0.2, no logra la defensa prevista contra los administradores locales que pueden reemplazar las DLL de tiempo de ejecuci\u00f3n de Visual C++ (en %WINDIR%\\system32) por otras maliciosas" } ], "id": "CVE-2021-35957", "lastModified": "2024-11-21T06:12:50.080", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-13T14:15:08.807", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-045/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-045/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-13 14:15
Modified
2024-11-21 06:05
Severity ?
Summary
SES Evolution before 2.1.0 allows duplicating an existing security policy by leveraging access of a user having read-only access to security policies.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://advisories.stormshield.eu | Vendor Advisory | |
cve@mitre.org | https://advisories.stormshield.eu/2021-026/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu/2021-026/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
stormshield | endpoint_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "546EF33E-EFFC-4842-9A48-DF3FBFB6648C", "versionEndIncluding": "2.0.2", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SES Evolution before 2.1.0 allows duplicating an existing security policy by leveraging access of a user having read-only access to security policies." }, { "lang": "es", "value": "SES Evolution versiones anteriores a 2.1.0, permite duplicar una pol\u00edtica de seguridad existente al aprovechar el acceso de un usuario con acceso de s\u00f3lo lectura a las pol\u00edticas de seguridad" } ], "id": "CVE-2021-31224", "lastModified": "2024-11-21T06:05:19.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-13T14:15:08.743", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-026/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-026/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-13 13:15
Modified
2024-11-21 06:05
Severity ?
Summary
SES Evolution before 2.1.0 allows deleting some resources not currently in use by any security policy by leveraging access to a computer having the administration console installed.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://advisories.stormshield.eu | Vendor Advisory | |
cve@mitre.org | https://advisories.stormshield.eu/2021-027/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://advisories.stormshield.eu/2021-027/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
stormshield | endpoint_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stormshield:endpoint_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "546EF33E-EFFC-4842-9A48-DF3FBFB6648C", "versionEndIncluding": "2.0.2", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SES Evolution before 2.1.0 allows deleting some resources not currently in use by any security policy by leveraging access to a computer having the administration console installed." }, { "lang": "es", "value": "SES Evolution versiones anteriores a 2.1.0, permite borrar algunos recursos que no est\u00e1n en uso por ninguna pol\u00edtica de seguridad al aprovechar el acceso a un ordenador que tenga instalada la consola de administraci\u00f3n" } ], "id": "CVE-2021-31225", "lastModified": "2024-11-21T06:05:20.120", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-13T13:15:09.207", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-027/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://advisories.stormshield.eu/2021-027/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2021-31223
Vulnerability from cvelistv5
Published
2021-07-13 13:19
Modified
2024-08-03 22:55
Severity ?
EPSS score ?
Summary
SES Evolution before 2.1.0 allows reading some parts of a security policy by leveraging access to a computer having the administration console installed.
References
▼ | URL | Tags |
---|---|---|
https://advisories.stormshield.eu | x_refsource_MISC | |
https://advisories.stormshield.eu/2021-025/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:55:53.397Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.stormshield.eu/2021-025/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SES Evolution before 2.1.0 allows reading some parts of a security policy by leveraging access to a computer having the administration console installed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-13T13:19:21", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.stormshield.eu/2021-025/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31223", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SES Evolution before 2.1.0 allows reading some parts of a security policy by leveraging access to a computer having the administration console installed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://advisories.stormshield.eu", "refsource": "MISC", "url": "https://advisories.stormshield.eu" }, { "name": "https://advisories.stormshield.eu/2021-025/", "refsource": "MISC", "url": "https://advisories.stormshield.eu/2021-025/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31223", "datePublished": "2021-07-13T13:19:21", "dateReserved": "2021-04-15T00:00:00", "dateUpdated": "2024-08-03T22:55:53.397Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31220
Vulnerability from cvelistv5
Published
2021-07-13 13:15
Modified
2024-08-03 22:55
Severity ?
EPSS score ?
Summary
SES Evolution before 2.1.0 allows modifying security policies by leveraging access of a user having read-only access to security policies.
References
▼ | URL | Tags |
---|---|---|
https://advisories.stormshield.eu | x_refsource_MISC | |
https://advisories.stormshield.eu/2021-022/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:55:53.571Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.stormshield.eu/2021-022/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SES Evolution before 2.1.0 allows modifying security policies by leveraging access of a user having read-only access to security policies." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-13T13:15:34", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.stormshield.eu/2021-022/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31220", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SES Evolution before 2.1.0 allows modifying security policies by leveraging access of a user having read-only access to security policies." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://advisories.stormshield.eu", "refsource": "MISC", "url": "https://advisories.stormshield.eu" }, { "name": "https://advisories.stormshield.eu/2021-022/", "refsource": "MISC", "url": "https://advisories.stormshield.eu/2021-022/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31220", "datePublished": "2021-07-13T13:15:34", "dateReserved": "2021-04-15T00:00:00", "dateUpdated": "2024-08-03T22:55:53.571Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31225
Vulnerability from cvelistv5
Published
2021-07-13 12:57
Modified
2024-08-03 22:55
Severity ?
EPSS score ?
Summary
SES Evolution before 2.1.0 allows deleting some resources not currently in use by any security policy by leveraging access to a computer having the administration console installed.
References
▼ | URL | Tags |
---|---|---|
https://advisories.stormshield.eu | x_refsource_MISC | |
https://advisories.stormshield.eu/2021-027/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:55:53.249Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.stormshield.eu/2021-027/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SES Evolution before 2.1.0 allows deleting some resources not currently in use by any security policy by leveraging access to a computer having the administration console installed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-13T12:57:06", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.stormshield.eu/2021-027/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31225", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SES Evolution before 2.1.0 allows deleting some resources not currently in use by any security policy by leveraging access to a computer having the administration console installed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://advisories.stormshield.eu", "refsource": "MISC", "url": "https://advisories.stormshield.eu" }, { "name": "https://advisories.stormshield.eu/2021-027/", "refsource": "MISC", "url": "https://advisories.stormshield.eu/2021-027/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31225", "datePublished": "2021-07-13T12:57:06", "dateReserved": "2021-04-15T00:00:00", "dateUpdated": "2024-08-03T22:55:53.249Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4304
Vulnerability from cvelistv5
Published
2023-02-08 19:04
Modified
2025-02-13 16:33
Severity ?
EPSS score ?
Summary
A timing based side channel exists in the OpenSSL RSA Decryption implementation
which could be sufficient to recover a plaintext across a network in a
Bleichenbacher style attack. To achieve a successful decryption an attacker
would have to be able to send a very large number of trial messages for
decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5,
RSA-OEAP and RSASVE.
For example, in a TLS connection, RSA is commonly used by a client to send an
encrypted pre-master secret to the server. An attacker that had observed a
genuine connection between a client and a server could use this flaw to send
trial messages to the server and record the time taken to process them. After a
sufficiently large number of messages the attacker could recover the pre-master
secret used for the original connection and thus be able to decrypt the
application data sent over that connection.
References
▼ | URL | Tags |
---|---|---|
https://www.openssl.org/news/secadv/20230207.txt | vendor-advisory | |
https://security.gentoo.org/glsa/202402-08 |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:34:50.158Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "OpenSSL Advisory", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.openssl.org/news/secadv/20230207.txt" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202402-08" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "OpenSSL", "vendor": "OpenSSL", "versions": [ { "lessThan": "3.0.8", "status": "affected", "version": "3.0.0", "versionType": "semver" }, { "lessThan": "1.1.1t", "status": "affected", "version": "1.1.1", "versionType": "custom" }, { "lessThan": "1.0.2zg", "status": "affected", "version": "1.0.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Hubert Kario from RedHat" }, { "lang": "en", "type": "remediation developer", "user": "00000000-0000-4000-9000-000000000000", "value": "Dmitry Belyavsky from RedHat" }, { "lang": "en", "type": "remediation developer", "user": "00000000-0000-4000-9000-000000000000", "value": "Hubert Kario from RedHat" } ], "datePublic": "2023-02-07T00:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A timing based side channel exists in the OpenSSL RSA Decryption implementation\u003cbr\u003ewhich could be sufficient to recover a plaintext across a network in a\u003cbr\u003eBleichenbacher style attack. To achieve a successful decryption an attacker\u003cbr\u003ewould have to be able to send a very large number of trial messages for\u003cbr\u003edecryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5,\u003cbr\u003eRSA-OEAP and RSASVE.\u003cbr\u003e\u003cbr\u003eFor example, in a TLS connection, RSA is commonly used by a client to send an\u003cbr\u003eencrypted pre-master secret to the server. An attacker that had observed a\u003cbr\u003egenuine connection between a client and a server could use this flaw to send\u003cbr\u003etrial messages to the server and record the time taken to process them. After a\u003cbr\u003esufficiently large number of messages the attacker could recover the pre-master\u003cbr\u003esecret used for the original connection and thus be able to decrypt the\u003cbr\u003eapplication data sent over that connection.\u003cbr\u003e\u003cbr\u003e" } ], "value": "A timing based side channel exists in the OpenSSL RSA Decryption implementation\nwhich could be sufficient to recover a plaintext across a network in a\nBleichenbacher style attack. To achieve a successful decryption an attacker\nwould have to be able to send a very large number of trial messages for\ndecryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5,\nRSA-OEAP and RSASVE.\n\nFor example, in a TLS connection, RSA is commonly used by a client to send an\nencrypted pre-master secret to the server. An attacker that had observed a\ngenuine connection between a client and a server could use this flaw to send\ntrial messages to the server and record the time taken to process them. After a\nsufficiently large number of messages the attacker could recover the pre-master\nsecret used for the original connection and thus be able to decrypt the\napplication data sent over that connection." } ], "metrics": [ { "format": "other", "other": { "content": { "text": "MODERATE" }, "type": "https://www.openssl.org/policies/secpolicy.html" } } ], "problemTypes": [ { "descriptions": [ { "description": "timing based side channel attack", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-04T09:06:45.004Z", "orgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5", "shortName": "openssl" }, "references": [ { "name": "OpenSSL Advisory", "tags": [ "vendor-advisory" ], "url": "https://www.openssl.org/news/secadv/20230207.txt" }, { "url": "https://security.gentoo.org/glsa/202402-08" } ], "source": { "discovery": "UNKNOWN" }, "title": "Timing Oracle in RSA Decryption", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5", "assignerShortName": "openssl", "cveId": "CVE-2022-4304", "datePublished": "2023-02-08T19:04:28.890Z", "dateReserved": "2022-12-06T10:38:40.463Z", "dateUpdated": "2025-02-13T16:33:27.344Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31221
Vulnerability from cvelistv5
Published
2021-07-13 13:31
Modified
2024-08-03 22:55
Severity ?
EPSS score ?
Summary
SES Evolution before 2.1.0 allows deleting some parts of a security policy by leveraging access to a computer having the administration console installed.
References
▼ | URL | Tags |
---|---|---|
https://advisories.stormshield.eu | x_refsource_MISC | |
https://advisories.stormshield.eu/2021-023/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:55:53.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.stormshield.eu/2021-023/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SES Evolution before 2.1.0 allows deleting some parts of a security policy by leveraging access to a computer having the administration console installed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-13T13:31:26", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.stormshield.eu/2021-023/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31221", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SES Evolution before 2.1.0 allows deleting some parts of a security policy by leveraging access to a computer having the administration console installed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://advisories.stormshield.eu", "refsource": "MISC", "url": "https://advisories.stormshield.eu" }, { "name": "https://advisories.stormshield.eu/2021-023/", "refsource": "MISC", "url": "https://advisories.stormshield.eu/2021-023/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31221", "datePublished": "2021-07-13T13:31:26", "dateReserved": "2021-04-15T00:00:00", "dateUpdated": "2024-08-03T22:55:53.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45089
Vulnerability from cvelistv5
Published
2021-12-21 15:15
Modified
2024-08-04 04:32
Severity ?
EPSS score ?
Summary
Stormshield Endpoint Security 2.x before 2.1.2 has Incorrect Access Control.
References
▼ | URL | Tags |
---|---|---|
https://advisories.stormshield.eu/2021-071/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:32:13.546Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.stormshield.eu/2021-071/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stormshield Endpoint Security 2.x before 2.1.2 has Incorrect Access Control." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-21T15:15:02", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.stormshield.eu/2021-071/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-45089", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stormshield Endpoint Security 2.x before 2.1.2 has Incorrect Access Control." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://advisories.stormshield.eu/2021-071/", "refsource": "MISC", "url": "https://advisories.stormshield.eu/2021-071/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45089", "datePublished": "2021-12-21T15:15:02", "dateReserved": "2021-12-16T00:00:00", "dateUpdated": "2024-08-04T04:32:13.546Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45091
Vulnerability from cvelistv5
Published
2021-12-21 15:10
Modified
2024-08-04 04:32
Severity ?
EPSS score ?
Summary
Stormshield Endpoint Security from 2.1.0 to 2.1.1 has Incorrect Access Control.
References
▼ | URL | Tags |
---|---|---|
https://advisories.stormshield.eu/2021-072/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:32:13.669Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.stormshield.eu/2021-072/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stormshield Endpoint Security from 2.1.0 to 2.1.1 has Incorrect Access Control." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-21T15:10:57", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.stormshield.eu/2021-072/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-45091", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stormshield Endpoint Security from 2.1.0 to 2.1.1 has Incorrect Access Control." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://advisories.stormshield.eu/2021-072/", "refsource": "MISC", "url": "https://advisories.stormshield.eu/2021-072/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45091", "datePublished": "2021-12-21T15:10:57", "dateReserved": "2021-12-16T00:00:00", "dateUpdated": "2024-08-04T04:32:13.669Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-45090
Vulnerability from cvelistv5
Published
2021-12-21 15:17
Modified
2024-08-04 04:32
Severity ?
EPSS score ?
Summary
Stormshield Endpoint Security before 2.1.2 allows remote code execution.
References
▼ | URL | Tags |
---|---|---|
https://advisories.stormshield.eu/2021-070/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T04:32:13.667Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.stormshield.eu/2021-070/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stormshield Endpoint Security before 2.1.2 allows remote code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-21T15:17:04", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.stormshield.eu/2021-070/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-45090", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stormshield Endpoint Security before 2.1.2 allows remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://advisories.stormshield.eu/2021-070/", "refsource": "MISC", "url": "https://advisories.stormshield.eu/2021-070/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-45090", "datePublished": "2021-12-21T15:17:04", "dateReserved": "2021-12-16T00:00:00", "dateUpdated": "2024-08-04T04:32:13.667Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-35800
Vulnerability from cvelistv5
Published
2023-06-27 00:00
Modified
2024-12-02 21:36
Severity ?
EPSS score ?
Summary
Stormshield Endpoint Security Evolution 2.0.0 through 2.4.2 has Insecure Permissions. An ACL entry on the SES Evolution agent directory that contains the agent logs displayed in the GUI allows interactive users to read data, which could allow access to information reserved to administrators.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:30:45.332Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_transferred" ], "url": "https://advisories.stormshield.eu/2023-021/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-35800", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-02T21:36:17.415586Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-02T21:36:25.620Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stormshield Endpoint Security Evolution 2.0.0 through 2.4.2 has Insecure Permissions. An ACL entry on the SES Evolution agent directory that contains the agent logs displayed in the GUI allows interactive users to read data, which could allow access to information reserved to administrators." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-27T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://advisories.stormshield.eu" }, { "url": "https://advisories.stormshield.eu/2023-021/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-35800", "datePublished": "2023-06-27T00:00:00", "dateReserved": "2023-06-17T00:00:00", "dateUpdated": "2024-12-02T21:36:25.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-23561
Vulnerability from cvelistv5
Published
2023-05-30 00:00
Modified
2025-01-14 16:49
Severity ?
EPSS score ?
Summary
Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control: authenticated users can read sensitive information.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:35:33.534Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_transferred" ], "url": "https://advisories.stormshield.eu/2023-001/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-23561", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-14T16:35:10.094793Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-346", "description": "CWE-346 Origin Validation Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-14T16:49:59.727Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control: authenticated users can read sensitive information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-30T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://advisories.stormshield.eu" }, { "url": "https://advisories.stormshield.eu/2023-001/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-23561", "datePublished": "2023-05-30T00:00:00", "dateReserved": "2023-01-13T00:00:00", "dateUpdated": "2025-01-14T16:49:59.727Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31222
Vulnerability from cvelistv5
Published
2021-07-13 13:27
Modified
2024-08-03 22:55
Severity ?
EPSS score ?
Summary
SES Evolution before 2.1.0 allows updating some parts of a security policy by leveraging access to a computer having the administration console installed.
References
▼ | URL | Tags |
---|---|---|
https://advisories.stormshield.eu | x_refsource_MISC | |
https://advisories.stormshield.eu/2021-024/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:55:53.332Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.stormshield.eu/2021-024/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SES Evolution before 2.1.0 allows updating some parts of a security policy by leveraging access to a computer having the administration console installed." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-13T13:27:50", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.stormshield.eu/2021-024/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31222", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SES Evolution before 2.1.0 allows updating some parts of a security policy by leveraging access to a computer having the administration console installed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://advisories.stormshield.eu", "refsource": "MISC", "url": "https://advisories.stormshield.eu" }, { "name": "https://advisories.stormshield.eu/2021-024/", "refsource": "MISC", "url": "https://advisories.stormshield.eu/2021-024/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31222", "datePublished": "2021-07-13T13:27:50", "dateReserved": "2021-04-15T00:00:00", "dateUpdated": "2024-08-03T22:55:53.332Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-35799
Vulnerability from cvelistv5
Published
2023-06-27 00:00
Modified
2024-12-02 21:35
Severity ?
EPSS score ?
Summary
Stormshield Endpoint Security Evolution 2.0.0 through 2.3.2 has Insecure Permissions. An interactive user can use the SES Evolution agent to create arbitrary files with local system privileges.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:30:45.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_transferred" ], "url": "https://advisories.stormshield.eu/2023-022/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-35799", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-02T21:35:47.616165Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-02T21:35:59.377Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stormshield Endpoint Security Evolution 2.0.0 through 2.3.2 has Insecure Permissions. An interactive user can use the SES Evolution agent to create arbitrary files with local system privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-27T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://advisories.stormshield.eu" }, { "url": "https://advisories.stormshield.eu/2023-022/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-35799", "datePublished": "2023-06-27T00:00:00", "dateReserved": "2023-06-17T00:00:00", "dateUpdated": "2024-12-02T21:35:59.377Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-35957
Vulnerability from cvelistv5
Published
2021-07-13 13:05
Modified
2024-08-04 00:47
Severity ?
EPSS score ?
Summary
Stormshield Endpoint Security Evolution 2.0.0 through 2.0.2 does not accomplish the intended defense against local administrators who can replace the Visual C++ runtime DLLs (in %WINDIR%\system32) with malicious ones.
References
▼ | URL | Tags |
---|---|---|
https://advisories.stormshield.eu | x_refsource_MISC | |
https://advisories.stormshield.eu/2021-045/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.071Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.stormshield.eu/2021-045/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stormshield Endpoint Security Evolution 2.0.0 through 2.0.2 does not accomplish the intended defense against local administrators who can replace the Visual C++ runtime DLLs (in %WINDIR%\\system32) with malicious ones." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-13T13:05:26", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.stormshield.eu/2021-045/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-35957", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stormshield Endpoint Security Evolution 2.0.0 through 2.0.2 does not accomplish the intended defense against local administrators who can replace the Visual C++ runtime DLLs (in %WINDIR%\\system32) with malicious ones." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://advisories.stormshield.eu", "refsource": "MISC", "url": "https://advisories.stormshield.eu" }, { "name": "https://advisories.stormshield.eu/2021-045/", "refsource": "MISC", "url": "https://advisories.stormshield.eu/2021-045/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-35957", "datePublished": "2021-07-13T13:05:26", "dateReserved": "2021-06-29T00:00:00", "dateUpdated": "2024-08-04T00:47:43.071Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-23562
Vulnerability from cvelistv5
Published
2023-05-31 00:00
Modified
2025-01-10 16:28
Severity ?
EPSS score ?
Summary
Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control that allows an authenticated user can update global parameters.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:35:33.146Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_transferred" ], "url": "https://advisories.stormshield.eu/2023-002/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-23562", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-10T16:28:00.356158Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-10T16:28:06.397Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control that allows an authenticated user can update global parameters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-31T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://advisories.stormshield.eu" }, { "url": "https://advisories.stormshield.eu/2023-002/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2023-23562", "datePublished": "2023-05-31T00:00:00", "dateReserved": "2023-01-13T00:00:00", "dateUpdated": "2025-01-10T16:28:06.397Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-31224
Vulnerability from cvelistv5
Published
2021-07-13 13:10
Modified
2024-08-03 22:55
Severity ?
EPSS score ?
Summary
SES Evolution before 2.1.0 allows duplicating an existing security policy by leveraging access of a user having read-only access to security policies.
References
▼ | URL | Tags |
---|---|---|
https://advisories.stormshield.eu | x_refsource_MISC | |
https://advisories.stormshield.eu/2021-026/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:55:53.021Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://advisories.stormshield.eu/2021-026/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "SES Evolution before 2.1.0 allows duplicating an existing security policy by leveraging access of a user having read-only access to security policies." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-13T13:10:42", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.stormshield.eu" }, { "tags": [ "x_refsource_MISC" ], "url": "https://advisories.stormshield.eu/2021-026/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-31224", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SES Evolution before 2.1.0 allows duplicating an existing security policy by leveraging access of a user having read-only access to security policies." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://advisories.stormshield.eu", "refsource": "MISC", "url": "https://advisories.stormshield.eu" }, { "name": "https://advisories.stormshield.eu/2021-026/", "refsource": "MISC", "url": "https://advisories.stormshield.eu/2021-026/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-31224", "datePublished": "2021-07-13T13:10:42", "dateReserved": "2021-04-15T00:00:00", "dateUpdated": "2024-08-03T22:55:53.021Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }