CVE-2023-34198

7.3 HIGH

📋 TL;DR

This vulnerability in Stormshield Network Security (SNS) firewalls occurs when a Network object created from an inactive DHCP interface is used in filtering rules, causing the firewall to treat it as an 'any' type object. This can lead to unintended access control bypasses. Organizations using affected SNS firewall versions are impacted.

💻 Affected Systems

Products:
  • Stormshield Network Security (SNS)
Versions: SNS 1.0.0 through 3.7.36, 3.8.0 through 3.11.24, 4.0.0 through 4.3.18, 4.4.0 through 4.6.5, and 4.7.0
Operating Systems: Stormshield OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when Network objects created from inactive DHCP interfaces are used in filtering rules.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could bypass firewall filtering rules entirely, gaining unauthorized network access to protected systems or services.

🟠

Likely Case

Incorrect firewall rule enforcement allowing unintended network traffic through due to misconfigured Network objects.

🟢

If Mitigated

Proper network segmentation and defense-in-depth controls limit potential lateral movement even if filtering is bypassed.

🌐 Internet-Facing: MEDIUM - External attackers could potentially bypass firewall rules if they can trigger the DHCP interface condition.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this to bypass internal segmentation controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires specific network configuration conditions and knowledge of affected Network objects.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SNS 3.7.37, 3.11.25, 4.3.19, 4.6.6, or 4.7.1

Vendor Advisory: https://advisories.stormshield.eu/2023-019

Restart Required: Yes

Instructions:

1. Download appropriate patch version from Stormshield support portal. 2. Backup current configuration. 3. Apply patch via SNS web interface or CLI. 4. Reboot firewall as required. 5. Verify patch installation and configuration integrity.

🔧 Temporary Workarounds

Remove DHCP-based Network Objects

all

Identify and remove Network objects created from DHCP interfaces from all filtering rules.

Check via SNS web interface: Configuration > Network > Objects
Remove affected objects from all firewall rules

Use Static IP Objects

all

Replace DHCP-based Network objects with static IP address objects in filtering rules.

Create new static IP objects in Configuration > Network > Objects
Update firewall rules to use static objects

🧯 If You Can't Patch

  • Audit all Network objects and remove any created from DHCP interfaces from filtering rules
  • Implement additional network segmentation controls and monitor for unexpected traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check SNS version via web interface (Dashboard > System > Information) or CLI command 'show version'. Verify if using Network objects from DHCP interfaces in filtering rules.

Check Version:

show version

Verify Fix Applied:

After patching, verify version shows patched release and test that Network objects from DHCP interfaces now behave correctly in filtering rules.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected firewall rule matches
  • Traffic allowed that should be blocked according to configured rules
  • DHCP interface state changes

Network Indicators:

  • Traffic flows that bypass expected firewall restrictions
  • Unusual network connections from unexpected sources

SIEM Query:

firewall_action=allow AND (rule_name="*DHCP*" OR object_type="DHCP") AND NOT expected_traffic

🔗 References

📤 Share & Export