CVE-2023-28616
https://notcve.org/view.php?id=CVE-2023-28616
An issue was discovered in Stormshield Network Security (SNS) before 4.3.17, 4.4.x through 4.6.x before 4.6.4, and 4.7.x before 4.7.1. It affects user accounts for which the password has an equals sign or space character. The serverd process logs such passwords in cleartext, and potentially sends these logs to the Syslog component. Se descubrió un problema en Stormshield Network Security (SNS) anterior a 4.3.17, 4.4.x a 4.6.x anterior a 4.6.4 y 4.7.x anterior a 4.7.1. Afecta a las cuentas de usuario cuya contraseña tiene un signo igual o un espacio. • https://advisories.stormshield.eu/2023-006 • CWE-319: Cleartext Transmission of Sensitive Information •
CVE-2022-27812
https://notcve.org/view.php?id=CVE-2022-27812
Flooding SNS firewall versions 3.7.0 to 3.7.29, 3.11.0 to 3.11.17, 4.2.0 to 4.2.10, and 4.3.0 to 4.3.6 with specific forged traffic, can lead to SNS DoS. Inundar las versiones 3.7.0 a 3.7.29, 3.11.0 a 3.11.17, 4.2.0 a 4.2.10, y 4.3.0 a 4.3.6 del cortafuegos SNS con tráfico forjado específico, puede conducir a un DoS SNS • https://advisories.stormshield.eu/2022-009 •
CVE-2022-30279
https://notcve.org/view.php?id=CVE-2022-30279
An issue was discovered in Stormshield Network Security (SNS) 4.3.x before 4.3.8. The event logging of the ASQ sofbus lacbus plugin triggers the dereferencing of a NULL pointer, leading to a crash of SNS. An attacker could exploit this vulnerability via forged sofbus lacbus traffic to cause a firmware crash. Se ha detectado un problema en Stormshield Network Security (SNS) versiones 4.3.x anteriores a 4.3.8. El registro de eventos del complemento ASQ sofbus lacbus desencadena una desreferencia de puntero NULL, conllevando a un bloqueo de SNS. • https://advisories.stormshield.eu/2022-015 • CWE-476: NULL Pointer Dereference •
CVE-2022-23989
https://notcve.org/view.php?id=CVE-2022-23989
In Stormshield Network Security (SNS) before 3.7.25, 3.8.x through 3.11.x before 3.11.13, 4.x before 4.2.10, and 4.3.x before 4.3.5, a flood of connections to the SSLVPN service might lead to saturation of the loopback interface. This could result in the blocking of almost all network traffic, making the firewall unreachable. An attacker could exploit this via forged and properly timed traffic to cause a denial of service. En Stormshield Network Security (SNS) antes de la versión 3.7.25, de la 3.8.x a la 3.11.x antes de la 3.11.13, de la 4.x antes de la 4.2.10 y de la 4.3.x antes de la 4.3.5, una avalancha de conexiones al servicio SSLVPN podría provocar la saturación de la interfaz de loopback. Esto podría resultar en el bloqueo de casi todo el tráfico de red, haciendo que el firewall sea inalcanzable. • https://advisories.stormshield.eu/2022-003 •