Learn about CVE-2022-23232 affecting StorageGRID (formerly StorageGRID Webscale) versions before 11.6.0, allowing unauthorized S3 data access for disabled, expired, and locked user accounts.
A vulnerability in StorageGRID (formerly StorageGRID Webscale) versions prior to 11.6.0 could allow unauthorized access to S3 data by disabled, expired, or locked external user accounts. Immediate action and preventive measures are essential to secure affected systems.
Understanding CVE-2022-23232
This CVE impacts StorageGRID (formerly StorageGRID Webscale) versions prior to 11.6.0, potentially enabling unauthorized S3 data access by restricted user accounts.
What is CVE-2022-23232?
StorageGRID (formerly StorageGRID Webscale) versions prior to 11.6.0 are vulnerable to a security flaw that can be exploited to grant unauthorized access to disabled, expired, or locked external user accounts.
The Impact of CVE-2022-23232
Successful exploitation of this vulnerability could lead to compromised S3 data access for restricted accounts, posing a risk to data confidentiality and integrity.
Technical Details of CVE-2022-23232
The following technical aspects outline the vulnerability in detail.
Vulnerability Description
StorageGRID 11.6.0 and earlier versions do not properly block S3 access for disabled user accounts, allowing them to retrieve previously accessible data.
Affected Systems and Versions
StorageGRID (formerly StorageGRID Webscale) versions prior to 11.6.0 are confirmed to be affected by this vulnerability.
Exploitation Mechanism
External user accounts that are disabled, expired, or locked may still access S3 data if not manually removed from group memberships or Tenant Manager.
Mitigation and Prevention
To address and prevent the exploitation of CVE-2022-23232, immediate steps and ongoing security practices are crucial.
Immediate Steps to Take
All accounts that are expired, locked, or disabled in Active Directory, Azure, or other identity sources should be promptly removed from group memberships or S3 keys from Tenant Manager.
Long-Term Security Practices
Regularly review and update user account statuses to ensure unwanted access is restricted, especially for external and disabled accounts.
Patching and Updates
Ensure systems are updated to StorageGRID 11.6.0 or later to mitigate the vulnerability and enhance security measures.