CVE-2024-31946: n/a
An issue was discovered in Stormshield Network Security (SNS) 3.7.0 through 3.7.41, 3.10.0 through 3.11.29, 4.0 through 4.3.24, and 4.4.0 through 4.7.4. A user who has access to the SNS with write access on the email alerts page has the ability to create alert email containing malicious JavaScript, executed by the template preview. The following versions fix this: 3.7.42, 3.11.30, 4.3.25, and 4.7.5.
AI Analysis
Technical Summary
CVE-2024-31946 is a stored cross-site scripting (XSS) vulnerability identified in Stormshield Network Security (SNS) versions 3.7.0 through 3.7.41, 3.10.0 through 3.11.29, 4.0 through 4.3.24, and 4.4.0 through 4.7.4. The vulnerability arises because users with write permissions on the email alerts configuration page can insert malicious JavaScript code into alert email templates. When these templates are previewed, the embedded JavaScript executes in the context of the SNS management interface. This flaw is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), indicating insufficient input sanitization or output encoding. Exploitation requires authenticated users with elevated privileges (write access) and user interaction to preview the crafted template. The CVSS v3.1 base score is 4.2, reflecting a medium severity with local attack vector, low attack complexity, high privileges required, and user interaction needed. The impact primarily concerns confidentiality, as the malicious script could exfiltrate sensitive data or perform actions within the user's session. The vulnerability does not affect system integrity or availability directly. Stormshield has addressed this issue in versions 3.7.42, 3.11.30, 4.3.25, and 4.7.5. No public exploits have been reported to date, but the presence of this vulnerability in widely deployed SNS appliances poses a risk if attackers gain insider access or compromise legitimate user accounts.
Potential Impact
The primary impact of CVE-2024-31946 is on the confidentiality of information within organizations using vulnerable SNS versions. An attacker with write access to the email alerts page can embed malicious JavaScript that executes in the context of the SNS management interface during template preview. This can lead to unauthorized disclosure of sensitive data, such as configuration details, alert information, or user session tokens. Although the vulnerability does not directly compromise system integrity or availability, it could facilitate further attacks by enabling session hijacking or privilege escalation if combined with other vulnerabilities. The requirement for high privileges and user interaction limits the scope of exploitation to insiders or compromised accounts with elevated rights. However, given the critical role of SNS appliances in network security monitoring and alerting, any compromise could undermine an organization's security posture and incident response capabilities. Organizations relying on SNS for perimeter defense or internal network segmentation may face increased risk of data leakage or lateral movement by attackers exploiting this vulnerability.
Mitigation Recommendations
To mitigate CVE-2024-31946, organizations should immediately upgrade affected Stormshield Network Security appliances to the fixed versions: 3.7.42, 3.11.30, 4.3.25, or 4.7.5, depending on their current version. Until patching is complete, restrict write access to the email alerts configuration page strictly to trusted administrators and monitor for unusual activity related to alert template modifications. Implement strong authentication controls, including multi-factor authentication (MFA), to reduce the risk of account compromise. Additionally, conduct regular audits of alert templates to detect unauthorized or suspicious JavaScript code. Network segmentation and least privilege principles should be enforced to limit the number of users with high-level SNS access. Security teams should also educate administrators about the risks of previewing untrusted templates and encourage cautious handling of alert configurations. Finally, monitor SNS logs and alerting behavior for anomalies that could indicate exploitation attempts or insider misuse.
Affected Countries
France, Germany, United Kingdom, United States, Canada, Australia, Belgium, Netherlands, Italy, Spain
CVE-2024-31946: n/a
Description
An issue was discovered in Stormshield Network Security (SNS) 3.7.0 through 3.7.41, 3.10.0 through 3.11.29, 4.0 through 4.3.24, and 4.4.0 through 4.7.4. A user who has access to the SNS with write access on the email alerts page has the ability to create alert email containing malicious JavaScript, executed by the template preview. The following versions fix this: 3.7.42, 3.11.30, 4.3.25, and 4.7.5.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-31946 is a stored cross-site scripting (XSS) vulnerability identified in Stormshield Network Security (SNS) versions 3.7.0 through 3.7.41, 3.10.0 through 3.11.29, 4.0 through 4.3.24, and 4.4.0 through 4.7.4. The vulnerability arises because users with write permissions on the email alerts configuration page can insert malicious JavaScript code into alert email templates. When these templates are previewed, the embedded JavaScript executes in the context of the SNS management interface. This flaw is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), indicating insufficient input sanitization or output encoding. Exploitation requires authenticated users with elevated privileges (write access) and user interaction to preview the crafted template. The CVSS v3.1 base score is 4.2, reflecting a medium severity with local attack vector, low attack complexity, high privileges required, and user interaction needed. The impact primarily concerns confidentiality, as the malicious script could exfiltrate sensitive data or perform actions within the user's session. The vulnerability does not affect system integrity or availability directly. Stormshield has addressed this issue in versions 3.7.42, 3.11.30, 4.3.25, and 4.7.5. No public exploits have been reported to date, but the presence of this vulnerability in widely deployed SNS appliances poses a risk if attackers gain insider access or compromise legitimate user accounts.
Potential Impact
The primary impact of CVE-2024-31946 is on the confidentiality of information within organizations using vulnerable SNS versions. An attacker with write access to the email alerts page can embed malicious JavaScript that executes in the context of the SNS management interface during template preview. This can lead to unauthorized disclosure of sensitive data, such as configuration details, alert information, or user session tokens. Although the vulnerability does not directly compromise system integrity or availability, it could facilitate further attacks by enabling session hijacking or privilege escalation if combined with other vulnerabilities. The requirement for high privileges and user interaction limits the scope of exploitation to insiders or compromised accounts with elevated rights. However, given the critical role of SNS appliances in network security monitoring and alerting, any compromise could undermine an organization's security posture and incident response capabilities. Organizations relying on SNS for perimeter defense or internal network segmentation may face increased risk of data leakage or lateral movement by attackers exploiting this vulnerability.
Mitigation Recommendations
To mitigate CVE-2024-31946, organizations should immediately upgrade affected Stormshield Network Security appliances to the fixed versions: 3.7.42, 3.11.30, 4.3.25, or 4.7.5, depending on their current version. Until patching is complete, restrict write access to the email alerts configuration page strictly to trusted administrators and monitor for unusual activity related to alert template modifications. Implement strong authentication controls, including multi-factor authentication (MFA), to reduce the risk of account compromise. Additionally, conduct regular audits of alert templates to detect unauthorized or suspicious JavaScript code. Network segmentation and least privilege principles should be enforced to limit the number of users with high-level SNS access. Security teams should also educate administrators about the risks of previewing untrusted templates and encourage cautious handling of alert configurations. Finally, monitor SNS logs and alerting behavior for anomalies that could indicate exploitation attempts or insider misuse.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-04-07T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6dd8b7ef31ef0b58f7cd
Added to database: 2/25/2026, 9:47:04 PM
Last enriched: 2/26/2026, 4:17:10 PM
Last updated: 4/12/2026, 3:51:13 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.