Endpoint Security Stormshield Endpoint Security

Do you want an email whenever new security vulnerabilities are reported in Stormshield Endpoint Security?

By the Year

In 2024 there have been 0 vulnerabilities in Stormshield Endpoint Security . Last year Endpoint Security had 5 security vulnerabilities published. Right now, Endpoint Security is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 5 5.10
2022 0 0.00
2021 10 5.91
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Endpoint Security vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Stormshield Endpoint Security Security Vulnerabilities

Stormshield Endpoint Security Evolution 2.0.0 through 2.4.2 has Insecure Permissions

CVE-2023-35800 4.3 - Medium - June 27, 2023

Stormshield Endpoint Security Evolution 2.0.0 through 2.4.2 has Insecure Permissions. An ACL entry on the SES Evolution agent directory that contains the agent logs displayed in the GUI allows interactive users to read data, which could allow access to information reserved to administrators.

Incorrect Permission Assignment for Critical Resource

Stormshield Endpoint Security Evolution 2.0.0 through 2.3.2 has Insecure Permissions

CVE-2023-35799 5.5 - Medium - June 27, 2023

Stormshield Endpoint Security Evolution 2.0.0 through 2.3.2 has Insecure Permissions. An interactive user can use the SES Evolution agent to create arbitrary files with local system privileges.

Incorrect Permission Assignment for Critical Resource

Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control

CVE-2023-23562 4.3 - Medium - May 31, 2023

Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control that allows an authenticated user can update global parameters.

Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control: authenticated users

CVE-2023-23561 5.5 - Medium - May 30, 2023

Stormshield Endpoint Security 2.3.0 through 2.3.2 has Incorrect Access Control: authenticated users can read sensitive information.

A timing based side channel exists in the OpenSSL RSA Decryption implementation

CVE-2022-4304 5.9 - Medium - February 08, 2023

A timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.

Side Channel Attack

Stormshield Endpoint Security

CVE-2021-45091 4.3 - Medium - December 21, 2021

Stormshield Endpoint Security from 2.1.0 to 2.1.1 has Incorrect Access Control.

Stormshield Endpoint Security before 2.1.2

CVE-2021-45090 9.8 - Critical - December 21, 2021

Stormshield Endpoint Security before 2.1.2 allows remote code execution.

Stormshield Endpoint Security 2.x before 2.1.2 has Incorrect Access Control.

CVE-2021-45089 5.2 - Medium - December 21, 2021

Stormshield Endpoint Security 2.x before 2.1.2 has Incorrect Access Control.

Stormshield Endpoint Security Evolution 2.0.0 through 2.0.2 does not accomplish the intended defense against local administrators who

CVE-2021-35957 6.7 - Medium - July 13, 2021

Stormshield Endpoint Security Evolution 2.0.0 through 2.0.2 does not accomplish the intended defense against local administrators who can replace the Visual C++ runtime DLLs (in %WINDIR%\system32) with malicious ones.

DLL preloading

SES Evolution before 2.1.0

CVE-2021-31224 3.5 - Low - July 13, 2021

SES Evolution before 2.1.0 allows duplicating an existing security policy by leveraging access of a user having read-only access to security policies.

SES Evolution before 2.1.0

CVE-2021-31223 5.7 - Medium - July 13, 2021

SES Evolution before 2.1.0 allows reading some parts of a security policy by leveraging access to a computer having the administration console installed.

SES Evolution before 2.1.0

CVE-2021-31222 5.7 - Medium - July 13, 2021

SES Evolution before 2.1.0 allows updating some parts of a security policy by leveraging access to a computer having the administration console installed.

SES Evolution before 2.1.0

CVE-2021-31221 5.7 - Medium - July 13, 2021

SES Evolution before 2.1.0 allows deleting some parts of a security policy by leveraging access to a computer having the administration console installed.

SES Evolution before 2.1.0

CVE-2021-31220 5.2 - Medium - July 13, 2021

SES Evolution before 2.1.0 allows modifying security policies by leveraging access of a user having read-only access to security policies.

SES Evolution before 2.1.0

CVE-2021-31225 7.3 - High - July 13, 2021

SES Evolution before 2.1.0 allows deleting some resources not currently in use by any security policy by leveraging access to a computer having the administration console installed.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Stormshield Endpoint Security or by Stormshield? Click the Watch button to subscribe.

Stormshield
Vendor

subscribe