Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "1963DE20-CE8C-4776-B355-541A682B32A4", "versionEndExcluding": "2.7.8", "versionStartIncluding": "2.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBAB743F-89C0-4152-A4E7-1633E4492B51", "versionEndIncluding": "2.16.0", "versionStartIncluding": "2.8.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7C6C367-2B85-4F65-8E36-E9F791DE3256", "versionEndIncluding": "3.7.17", "versionStartIncluding": "3.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B359EE3-CFBF-4F12-9E07-FCBCEB41CAB8", "versionEndIncluding": "3.11.5", "versionStartIncluding": "3.8.0", "vulnerable": true}, {"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "268FCC1D-500C-4F39-B688-96130AA60D16", "versionEndExcluding": "4.1.5", "versionStartIncluding": "4.0.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in Stormshield Network Security could allow an attacker to trigger a protection related to ARP/NDP tables management, which would temporarily prevent the system to contact new hosts via IPv4 or IPv6. This affects versions 2.0.0 to 2.7.7, 2.8.0 to 2.16.0, 3.0.0 to 3.7.16, 3.8.0 to 3.11.4, and 4.0.0 to 4.1.5. Fixed in versions 2.7.8, 3.7.17, 3.11.5, and 4.2.0."}, {"lang": "es", "value": "Una vulnerabilidad en Stormshield Network Security, podr\u00eda permitir a un atacante desencadenar una protecci\u00f3n relacionada a una administraci\u00f3n de tablas ARP/NDP, lo que impedir\u00eda temporalmente al sistema comunicarse con nuevos hosts por medio de IPv4 o IPv6. Esto afecta a versiones 2.0.0 hasta 2.7.7, versiones 2.8.0 hasta 2.16.0, versiones 3.0.0 hasta 3.7.16, versiones 3.8.0 hasta 3.11.4 y versiones 4.0.0 hasta 4.1.5. Corregido en versiones 2.7.8, 3.7.17, 3.11.5 y 4.2.0"}], "id": "CVE-2021-3384", "lastModified": "2024-11-21T06:21:23.687", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}], "cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2021-03-02T18:15:15.977", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "https://advisories.stormshield.eu/2020-049/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://advisories.stormshield.eu/2020-049/"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}], "source": "nvd@nist.gov", "type": "Primary"}]}