First published: Tue Mar 15 2022(Updated: )
In Stormshield Network Security (SNS) before 3.7.25, 3.8.x through 3.11.x before 3.11.13, 4.x before 4.2.10, and 4.3.x before 4.3.5, a flood of connections to the SSLVPN service might lead to saturation of the loopback interface. This could result in the blocking of almost all network traffic, making the firewall unreachable. An attacker could exploit this via forged and properly timed traffic to cause a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Stormshield Network Security | >=3.0.0<3.7.25 | |
Stormshield Network Security | >=3.8.0<3.11.13 | |
Stormshield Network Security | >=4.0.0<4.2.10 | |
Stormshield Network Security | >=4.3.0<4.3.5 | |
Stormshield Stormshield Network Security | >=3.0.0<3.7.25 | |
Stormshield Stormshield Network Security | >=3.8.0<3.11.13 | |
Stormshield Stormshield Network Security | >=4.0.0<4.2.10 | |
Stormshield Stormshield Network Security | >=4.3.0<4.3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23989 is a vulnerability in Stormshield Network Security (SNS) that can cause saturation of the loopback interface, resulting in the blocking of network traffic.
The CVE-2022-23989 vulnerability can lead to the saturation of the loopback interface, which can block almost all network traffic, impacting the availability and functionality of the network.
The severity of CVE-2022-23989 is high, with a severity value of 7.5.
Stormshield Network Security versions 3.0.0 to 3.7.25, 3.8.0 to 3.11.13, 4.0.0 to 4.2.10, and 4.3.0 to 4.3.5 are affected by CVE-2022-23989.
You can find more information about CVE-2022-23989 on the official Stormshield advisories website: https://advisories.stormshield.eu/2022-003