Vulnerability Details : CVE-2023-41166
An issue was discovered in Stormshield Network Security (SNS) 3.7.0 through 3.7.39, 3.11.0 through 3.11.27, 4.3.0 through 4.3.22, 4.6.0 through 4.6.9, and 4.7.0 through 4.7.1. It's possible to know if a specific user account exists on the SNS firewall by using remote access commands.
Products affected by CVE-2023-41166
- cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*
- cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*
- Stormshield » Stormshield Network SecurityVersions from including (>=) 3.11.0 and up to, including, (<=) 3.11.27cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*
- cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*
- Stormshield » Stormshield Network SecurityVersions from including (>=) 3.7.0 and up to, including, (<=) 3.7.39cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-41166
0.19%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 39 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-41166
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
NIST |
References for CVE-2023-41166
-
https://advisories.stormshield.eu/2023-027
SNS: Possible user enumeration with NSRPC | Stormshield securityVendor Advisory
Jump to