CVE-2023-26095

7.5 HIGH

📋 TL;DR

A vulnerability in Stormshield Network Security (SNS) ASQ component allows remote attackers to cause a denial-of-service crash by sending a specially crafted SIP packet. This affects SNS firewall appliances running vulnerable versions, potentially disrupting network security services.

💻 Affected Systems

Products:
  • Stormshield Network Security (SNS)
Versions: 4.3.15 before 4.3.16 and 4.6.x before 4.6.3
Operating Systems: Stormshield OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects ASQ (Application Security Quality) component when processing SIP packets. All configurations with SIP inspection enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete firewall crash leading to network security bypass, allowing unrestricted traffic flow and potential network compromise.

🟠

Likely Case

Denial-of-service causing firewall reboot and temporary network disruption until service restoration.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring detecting anomalous SIP traffic.

🌐 Internet-Facing: HIGH - Firewalls are typically internet-facing and process SIP packets from external sources.
🏢 Internal Only: MEDIUM - Internal SIP traffic could also trigger the vulnerability if firewall processes internal traffic.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Requires only sending crafted SIP packet to vulnerable interface.

Exploitation requires network access to firewall's SIP processing interface. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.3.16 or 4.6.3

Vendor Advisory: https://advisories.stormshield.eu/2023-007/

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download appropriate firmware update from Stormshield portal. 3. Apply update via web interface or CLI. 4. Reboot appliance. 5. Verify version and functionality.

🔧 Temporary Workarounds

Disable SIP Inspection

all

Temporarily disable SIP packet inspection in ASQ rules to prevent exploitation.

Navigate to Security Policies > Application Security > Disable SIP inspection rules

Network Segmentation

all

Restrict SIP traffic to trusted sources only using firewall rules.

Add firewall rule to allow SIP only from trusted IP ranges

🧯 If You Can't Patch

  • Implement strict network ACLs to limit SIP traffic to trusted sources only
  • Deploy network monitoring to detect anomalous SIP packets and potential exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check current firmware version via web interface (System > Information) or CLI command 'show version'

Check Version:

show version

Verify Fix Applied:

Confirm version is 4.3.16 or higher for 4.3.x branch, or 4.6.3 or higher for 4.6.x branch

📡 Detection & Monitoring

Log Indicators:

  • Firewall crash/reboot events
  • ASQ component failure logs
  • SIP packet processing errors

Network Indicators:

  • Unusual SIP traffic patterns
  • Malformed SIP packets to firewall interfaces

SIEM Query:

source="stormshield" AND (event_type="crash" OR component="ASQ" OR protocol="SIP")

🔗 References

📤 Share & Export