CVE-2024-37386: n/a
An issue was discovered in Stormshield Network Security (SNS) 4.0.0 through 4.3.25, 4.4.0 through 4.7.5, and 4.8.0. Certain manipulations allow restarting in single-user mode despite the activation of secure boot. The following versions fix this: 4.3.27, 4.7.6, and 4.8.2.
AI Analysis
Technical Summary
CVE-2024-37386 is a vulnerability identified in multiple versions of Stormshield Network Security (SNS) appliances, specifically versions 4.0.0 through 4.3.25, 4.4.0 through 4.7.5, and 4.8.0. The issue arises from a flaw that allows certain manipulations to force the device to restart in single-user mode, bypassing the protections normally enforced by secure boot mechanisms. Secure boot is designed to ensure that only trusted software is loaded during system startup, preventing unauthorized code execution. By circumventing this, an attacker can gain access to a minimal privileged environment without authentication, potentially allowing them to perform sensitive administrative actions or extract confidential information. The vulnerability is classified under CWE-284 (Improper Access Control), indicating a failure to properly restrict access to critical system functions. The CVSS v3.1 base score is 4.2 (medium), reflecting that exploitation requires network access with high attack complexity, no privileges, and no user interaction, but results primarily in confidentiality impact without affecting integrity or availability. No known exploits are currently reported in the wild. The vendor has released patches in versions 4.3.27, 4.7.6, and 4.8.2 to address this issue. This vulnerability is particularly concerning for organizations relying on SNS appliances for perimeter or internal network security, as it undermines the trustworthiness of the device's secure boot process and could facilitate unauthorized administrative access.
Potential Impact
The primary impact of CVE-2024-37386 is the potential unauthorized access to the SNS device in single-user mode, bypassing secure boot protections. This can lead to exposure of sensitive configuration data, credentials, or system internals, compromising confidentiality. While the vulnerability does not directly affect system integrity or availability, the unauthorized access gained could be leveraged by attackers to perform further malicious activities, such as configuration changes or lateral movement within the network. Organizations relying on SNS appliances for critical network security functions may face increased risk of device compromise, undermining overall network defense. The requirement for network-level access and high attack complexity somewhat limits exploitation, but the lack of authentication or user interaction needed means that once an attacker gains access to the network segment, exploitation is feasible. This vulnerability could be particularly impactful in environments where SNS devices are deployed in sensitive or high-security contexts, such as government, defense, or critical infrastructure sectors.
Mitigation Recommendations
To mitigate CVE-2024-37386, organizations should immediately upgrade affected Stormshield Network Security devices to the fixed versions 4.3.27, 4.7.6, or 4.8.2 as appropriate. In addition to patching, network segmentation should be enforced to restrict access to SNS management interfaces and reduce the attack surface. Implement strict access control lists (ACLs) to limit which hosts can communicate with SNS devices, especially on management ports. Monitor device logs and network traffic for unusual restart patterns or attempts to enter single-user mode. Employ multi-factor authentication and strong password policies for device administration to reduce risk if unauthorized access is attempted. Regularly audit device configurations and firmware versions to ensure compliance with security policies. Finally, maintain an incident response plan that includes procedures for SNS device compromise scenarios to enable rapid containment and recovery.
Affected Countries
France, Germany, United Kingdom, United States, Canada, Australia, Belgium, Netherlands, Italy, Spain
CVE-2024-37386: n/a
Description
An issue was discovered in Stormshield Network Security (SNS) 4.0.0 through 4.3.25, 4.4.0 through 4.7.5, and 4.8.0. Certain manipulations allow restarting in single-user mode despite the activation of secure boot. The following versions fix this: 4.3.27, 4.7.6, and 4.8.2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-37386 is a vulnerability identified in multiple versions of Stormshield Network Security (SNS) appliances, specifically versions 4.0.0 through 4.3.25, 4.4.0 through 4.7.5, and 4.8.0. The issue arises from a flaw that allows certain manipulations to force the device to restart in single-user mode, bypassing the protections normally enforced by secure boot mechanisms. Secure boot is designed to ensure that only trusted software is loaded during system startup, preventing unauthorized code execution. By circumventing this, an attacker can gain access to a minimal privileged environment without authentication, potentially allowing them to perform sensitive administrative actions or extract confidential information. The vulnerability is classified under CWE-284 (Improper Access Control), indicating a failure to properly restrict access to critical system functions. The CVSS v3.1 base score is 4.2 (medium), reflecting that exploitation requires network access with high attack complexity, no privileges, and no user interaction, but results primarily in confidentiality impact without affecting integrity or availability. No known exploits are currently reported in the wild. The vendor has released patches in versions 4.3.27, 4.7.6, and 4.8.2 to address this issue. This vulnerability is particularly concerning for organizations relying on SNS appliances for perimeter or internal network security, as it undermines the trustworthiness of the device's secure boot process and could facilitate unauthorized administrative access.
Potential Impact
The primary impact of CVE-2024-37386 is the potential unauthorized access to the SNS device in single-user mode, bypassing secure boot protections. This can lead to exposure of sensitive configuration data, credentials, or system internals, compromising confidentiality. While the vulnerability does not directly affect system integrity or availability, the unauthorized access gained could be leveraged by attackers to perform further malicious activities, such as configuration changes or lateral movement within the network. Organizations relying on SNS appliances for critical network security functions may face increased risk of device compromise, undermining overall network defense. The requirement for network-level access and high attack complexity somewhat limits exploitation, but the lack of authentication or user interaction needed means that once an attacker gains access to the network segment, exploitation is feasible. This vulnerability could be particularly impactful in environments where SNS devices are deployed in sensitive or high-security contexts, such as government, defense, or critical infrastructure sectors.
Mitigation Recommendations
To mitigate CVE-2024-37386, organizations should immediately upgrade affected Stormshield Network Security devices to the fixed versions 4.3.27, 4.7.6, or 4.8.2 as appropriate. In addition to patching, network segmentation should be enforced to restrict access to SNS management interfaces and reduce the attack surface. Implement strict access control lists (ACLs) to limit which hosts can communicate with SNS devices, especially on management ports. Monitor device logs and network traffic for unusual restart patterns or attempts to enter single-user mode. Employ multi-factor authentication and strong password policies for device administration to reduce risk if unauthorized access is attempted. Regularly audit device configurations and firmware versions to ensure compliance with security policies. Finally, maintain an incident response plan that includes procedures for SNS device compromise scenarios to enable rapid containment and recovery.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-06-07T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c68b7ef31ef0b563b59
Added to database: 2/25/2026, 9:40:56 PM
Last enriched: 2/28/2026, 3:38:39 AM
Last updated: 4/12/2026, 6:15:13 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.