First published: Mon Dec 25 2023(Updated: )
An issue was discovered in Stormshield Network Security (SNS) SNS 4.3.13 through 4.3.22 before 4.3.23, SNS 4.6.0 through 4.6.9 before 4.6.10, and SNS 4.7.0 through 4.7.1 before 4.7.2. An attacker can overflow the cookie threshold, making an IPsec connection impossible.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Stormshield Network Security | >=4.3.13<4.3.23 | |
Stormshield Network Security | >=4.6.0<4.6.10 | |
Stormshield Network Security | >=4.7.0<4.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-47091 is considered to have a high severity due to its potential to disrupt IPsec connections.
To resolve CVE-2023-47091, upgrade your Stormshield Network Security software to version 4.3.23, 4.6.10, or 4.7.2 or later.
CVE-2023-47091 affects versions 4.3.13 to 4.3.22, 4.6.0 to 4.6.9, and 4.7.0 to 4.7.1 of Stormshield Network Security.
CVE-2023-47091 enables attackers to overflow the cookie threshold, resulting in failure of IPsec connections.
Currently, there are no documented workarounds for CVE-2023-47091, therefore upgrading is the recommended solution.