CVE-2025-48707

7.5 HIGH

📋 TL;DR

A vulnerability in Stormshield Network Security (SNS) firewalls allows TPM authentication information to be shared among administrators in certain high-availability configurations. This can lead to unauthorized administrators gaining access to sensitive secrets. Organizations using SNS firewalls in HA setups before version 5.0.1 are affected.

💻 Affected Systems

Products:
  • Stormshield Network Security (SNS)
Versions: All versions before 5.0.1
Operating Systems: Stormshield OS
Default Config Vulnerable: ✅ No
Notes: Only affects systems configured in High Availability (HA) mode with TPM authentication enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized administrators could gain access to TPM-protected secrets, potentially compromising the entire firewall infrastructure and allowing lateral movement into protected networks.

🟠

Likely Case

Administrators with legitimate access to one HA node could inadvertently gain access to TPM secrets on other nodes, violating security boundaries and potentially exposing sensitive authentication data.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to potential information disclosure between authorized administrators rather than external attackers.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: HIGH with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires administrative access to the SNS firewall and specific HA configuration conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.0.1

Vendor Advisory: https://advisories.stormshield.eu/2025-003/

Restart Required: Yes

Instructions:

1. Download SNS version 5.0.1 from Stormshield portal. 2. Backup current configuration. 3. Apply update through web interface or CLI. 4. Reboot firewall after installation completes.

🔧 Temporary Workarounds

Disable HA TPM Authentication

all

Temporarily disable TPM-based authentication in HA configurations until patching can be completed.

# Requires CLI access to SNS firewall
configure
set high-availability tpm-authentication disabled
commit

Isolate HA Management Networks

all

Ensure HA management interfaces are on isolated, restricted networks separate from regular administrative access.

🧯 If You Can't Patch

  • Implement strict administrative access controls and monitoring for all HA cluster members.
  • Consider temporarily disabling HA functionality if business continuity allows.

🔍 How to Verify

Check if Vulnerable:

Check SNS version via web interface (System > Information) or CLI command 'show version'. If version is below 5.0.1 and HA with TPM is configured, system is vulnerable.

Check Version:

show version

Verify Fix Applied:

After patching, verify version shows 5.0.1 or higher and test HA failover to ensure TPM authentication functions correctly without secret sharing.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrative access patterns between HA nodes
  • TPM authentication failures or anomalies in HA synchronization logs

Network Indicators:

  • Unexpected administrative traffic between HA cluster members outside normal synchronization patterns

SIEM Query:

source="sns-firewall" AND (event_type="admin_access" OR event_type="ha_sync") AND (src_ip=ha_node_ip OR dest_ip=ha_node_ip)

🔗 References

📤 Share & Export