Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31946: n/a

0
Medium
VulnerabilityCVE-2024-31946cvecve-2024-31946
Published: Mon Jul 15 2024 (07/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Stormshield Network Security (SNS) 3.7.0 through 3.7.41, 3.10.0 through 3.11.29, 4.0 through 4.3.24, and 4.4.0 through 4.7.4. A user who has access to the SNS with write access on the email alerts page has the ability to create alert email containing malicious JavaScript, executed by the template preview. The following versions fix this: 3.7.42, 3.11.30, 4.3.25, and 4.7.5.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:17:10 UTC

Technical Analysis

CVE-2024-31946 is a stored cross-site scripting (XSS) vulnerability identified in Stormshield Network Security (SNS) versions 3.7.0 through 3.7.41, 3.10.0 through 3.11.29, 4.0 through 4.3.24, and 4.4.0 through 4.7.4. The vulnerability arises because users with write permissions on the email alerts configuration page can insert malicious JavaScript code into alert email templates. When these templates are previewed, the embedded JavaScript executes in the context of the SNS management interface. This flaw is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), indicating insufficient input sanitization or output encoding. Exploitation requires authenticated users with elevated privileges (write access) and user interaction to preview the crafted template. The CVSS v3.1 base score is 4.2, reflecting a medium severity with local attack vector, low attack complexity, high privileges required, and user interaction needed. The impact primarily concerns confidentiality, as the malicious script could exfiltrate sensitive data or perform actions within the user's session. The vulnerability does not affect system integrity or availability directly. Stormshield has addressed this issue in versions 3.7.42, 3.11.30, 4.3.25, and 4.7.5. No public exploits have been reported to date, but the presence of this vulnerability in widely deployed SNS appliances poses a risk if attackers gain insider access or compromise legitimate user accounts.

Potential Impact

The primary impact of CVE-2024-31946 is on the confidentiality of information within organizations using vulnerable SNS versions. An attacker with write access to the email alerts page can embed malicious JavaScript that executes in the context of the SNS management interface during template preview. This can lead to unauthorized disclosure of sensitive data, such as configuration details, alert information, or user session tokens. Although the vulnerability does not directly compromise system integrity or availability, it could facilitate further attacks by enabling session hijacking or privilege escalation if combined with other vulnerabilities. The requirement for high privileges and user interaction limits the scope of exploitation to insiders or compromised accounts with elevated rights. However, given the critical role of SNS appliances in network security monitoring and alerting, any compromise could undermine an organization's security posture and incident response capabilities. Organizations relying on SNS for perimeter defense or internal network segmentation may face increased risk of data leakage or lateral movement by attackers exploiting this vulnerability.

Mitigation Recommendations

To mitigate CVE-2024-31946, organizations should immediately upgrade affected Stormshield Network Security appliances to the fixed versions: 3.7.42, 3.11.30, 4.3.25, or 4.7.5, depending on their current version. Until patching is complete, restrict write access to the email alerts configuration page strictly to trusted administrators and monitor for unusual activity related to alert template modifications. Implement strong authentication controls, including multi-factor authentication (MFA), to reduce the risk of account compromise. Additionally, conduct regular audits of alert templates to detect unauthorized or suspicious JavaScript code. Network segmentation and least privilege principles should be enforced to limit the number of users with high-level SNS access. Security teams should also educate administrators about the risks of previewing untrusted templates and encourage cautious handling of alert configurations. Finally, monitor SNS logs and alerting behavior for anomalies that could indicate exploitation attempts or insider misuse.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dd8b7ef31ef0b58f7cd

Added to database: 2/25/2026, 9:47:04 PM

Last enriched: 2/26/2026, 4:17:10 PM

Last updated: 4/12/2026, 3:51:13 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses