CVE-2023-47091: n/a in n/a
An issue was discovered in Stormshield Network Security (SNS) SNS 4.3.13 through 4.3.22 before 4.3.23, SNS 4.6.0 through 4.6.9 before 4.6.10, and SNS 4.7.0 through 4.7.1 before 4.7.2. An attacker can overflow the cookie threshold, making an IPsec connection impossible.
AI Analysis
Technical Summary
CVE-2023-47091 is a high-severity vulnerability affecting multiple versions of Stormshield Network Security (SNS) appliances, specifically versions 4.3.13 through 4.3.22 (prior to 4.3.23), 4.6.0 through 4.6.9 (prior to 4.6.10), and 4.7.0 through 4.7.1 (prior to 4.7.2). The vulnerability arises from a buffer overflow condition related to the handling of cookie thresholds during IPsec VPN connections. An attacker can exploit this flaw by sending crafted packets that overflow the cookie threshold, which disrupts the establishment of IPsec connections. This results in a denial of service (DoS) condition, rendering IPsec VPN tunnels inoperable. The vulnerability is classified under CWE-120 (Classic Buffer Overflow), indicating that improper bounds checking leads to memory corruption. According to the CVSS v3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), the attack can be executed remotely over the network without any privileges or user interaction, and it solely impacts availability without compromising confidentiality or integrity. No known exploits are currently reported in the wild, but the ease of exploitation and the critical role of IPsec VPNs in secure communications make this a significant threat. The lack of patch links in the provided data suggests that users should verify with Stormshield for the availability of official updates or mitigations. Given that Stormshield is a European cybersecurity vendor with strong market presence in Europe, particularly in France and neighboring countries, this vulnerability has notable regional relevance.
Potential Impact
The primary impact of CVE-2023-47091 is the disruption of IPsec VPN connectivity, which can severely affect the availability of secure network communications. For European organizations relying on Stormshield SNS appliances to secure remote access, site-to-site VPNs, or inter-office communications, this vulnerability could cause significant operational downtime. Critical sectors such as government, finance, healthcare, and critical infrastructure that depend on uninterrupted VPN services for secure data transmission may experience service outages, leading to potential loss of productivity and increased risk exposure. Although the vulnerability does not directly compromise data confidentiality or integrity, the denial of service can indirectly increase risk by forcing organizations to revert to less secure communication methods or exposing them to operational disruptions. The fact that exploitation requires no authentication or user interaction increases the risk of automated or opportunistic attacks, especially in environments where these devices are exposed to untrusted networks. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once details become public.
Mitigation Recommendations
1. Immediate verification and application of vendor patches or firmware updates as soon as they become available from Stormshield is critical. Users should monitor official Stormshield advisories and support channels for release announcements related to versions 4.3.23, 4.6.10, and 4.7.2 or later. 2. In the absence of patches, implement network-level mitigations such as restricting IPsec VPN access to trusted IP addresses and networks using firewall rules to reduce exposure to untrusted sources. 3. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection capabilities tuned to identify abnormal IPsec cookie threshold behaviors or malformed packets that could trigger the overflow. 4. Regularly audit and monitor VPN connection logs and device health metrics to detect unusual connection failures or service disruptions indicative of exploitation attempts. 5. Consider deploying redundant VPN gateways or failover mechanisms to maintain availability in case one device is impacted. 6. Conduct internal security awareness and incident response exercises focused on VPN service disruptions to ensure rapid detection and recovery. 7. Engage with Stormshield support to confirm the vulnerability status of deployed devices and obtain guidance on interim mitigations or configuration changes that may reduce risk.
Affected Countries
France, Germany, Belgium, Netherlands, Luxembourg, Italy, Spain
CVE-2023-47091: n/a in n/a
Description
An issue was discovered in Stormshield Network Security (SNS) SNS 4.3.13 through 4.3.22 before 4.3.23, SNS 4.6.0 through 4.6.9 before 4.6.10, and SNS 4.7.0 through 4.7.1 before 4.7.2. An attacker can overflow the cookie threshold, making an IPsec connection impossible.
AI-Powered Analysis
Technical Analysis
CVE-2023-47091 is a high-severity vulnerability affecting multiple versions of Stormshield Network Security (SNS) appliances, specifically versions 4.3.13 through 4.3.22 (prior to 4.3.23), 4.6.0 through 4.6.9 (prior to 4.6.10), and 4.7.0 through 4.7.1 (prior to 4.7.2). The vulnerability arises from a buffer overflow condition related to the handling of cookie thresholds during IPsec VPN connections. An attacker can exploit this flaw by sending crafted packets that overflow the cookie threshold, which disrupts the establishment of IPsec connections. This results in a denial of service (DoS) condition, rendering IPsec VPN tunnels inoperable. The vulnerability is classified under CWE-120 (Classic Buffer Overflow), indicating that improper bounds checking leads to memory corruption. According to the CVSS v3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), the attack can be executed remotely over the network without any privileges or user interaction, and it solely impacts availability without compromising confidentiality or integrity. No known exploits are currently reported in the wild, but the ease of exploitation and the critical role of IPsec VPNs in secure communications make this a significant threat. The lack of patch links in the provided data suggests that users should verify with Stormshield for the availability of official updates or mitigations. Given that Stormshield is a European cybersecurity vendor with strong market presence in Europe, particularly in France and neighboring countries, this vulnerability has notable regional relevance.
Potential Impact
The primary impact of CVE-2023-47091 is the disruption of IPsec VPN connectivity, which can severely affect the availability of secure network communications. For European organizations relying on Stormshield SNS appliances to secure remote access, site-to-site VPNs, or inter-office communications, this vulnerability could cause significant operational downtime. Critical sectors such as government, finance, healthcare, and critical infrastructure that depend on uninterrupted VPN services for secure data transmission may experience service outages, leading to potential loss of productivity and increased risk exposure. Although the vulnerability does not directly compromise data confidentiality or integrity, the denial of service can indirectly increase risk by forcing organizations to revert to less secure communication methods or exposing them to operational disruptions. The fact that exploitation requires no authentication or user interaction increases the risk of automated or opportunistic attacks, especially in environments where these devices are exposed to untrusted networks. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once details become public.
Mitigation Recommendations
1. Immediate verification and application of vendor patches or firmware updates as soon as they become available from Stormshield is critical. Users should monitor official Stormshield advisories and support channels for release announcements related to versions 4.3.23, 4.6.10, and 4.7.2 or later. 2. In the absence of patches, implement network-level mitigations such as restricting IPsec VPN access to trusted IP addresses and networks using firewall rules to reduce exposure to untrusted sources. 3. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection capabilities tuned to identify abnormal IPsec cookie threshold behaviors or malformed packets that could trigger the overflow. 4. Regularly audit and monitor VPN connection logs and device health metrics to detect unusual connection failures or service disruptions indicative of exploitation attempts. 5. Consider deploying redundant VPN gateways or failover mechanisms to maintain availability in case one device is impacted. 6. Conduct internal security awareness and incident response exercises focused on VPN service disruptions to ensure rapid detection and recovery. 7. Engage with Stormshield support to confirm the vulnerability status of deployed devices and obtain guidance on interim mitigations or configuration changes that may reduce risk.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2023-10-30T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf518f
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/21/2025, 10:13:04 PM
Last updated: 12/4/2025, 8:45:23 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13543: CWE-434 Unrestricted Upload of File with Dangerous Type in rtowebsites PostGallery
HighCVE-2025-12997: CWE-639 Authorization Bypass Through User-Controlled Key in Medtronic CareLink Network
LowCVE-2025-12996: CWE-532 Insertion of Sensitive Information into Log File in Medtronic CareLink Network
MediumCVE-2025-12995: CWE-307 Improper Restriction of Excessive Authentication Attempts in Medtronic CareLink Network
HighCVE-2025-12994: CWE-204 Observable Response Discrepancy in Medtronic CareLink Network
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.