Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-28372 : Vulnerability Insights and Analysis

Learn about CVE-2023-28372, a Medium severity vulnerability in FlashBlade Purity (OE) Version 4.1.0 allowing users to extend object retention period and impact object lock availability.

This CVE, assigned by PureStorage, involves a vulnerability in FlashBlade Purity (OE) Version 4.1.0 that allows a user with privileges to extend an object’s retention period to affect the availability of the object lock.

Understanding CVE-2023-28372

This section delves into the details of CVE-2023-28372, explaining the vulnerability and its impact, along with the technical aspects.

What is CVE-2023-28372?

The flaw in FlashBlade Purity (OE) Version 4.1.0 allows a privileged user to influence the availability of the object lock by extending an object's retention period. This issue poses a risk to the integrity and availability of the system.

The Impact of CVE-2023-28372

With a CVSS base score of 6.5 (Medium severity), this vulnerability has a significant impact on the availability of the FlashBlade Object Store. It requires high privileges to exploit and can lead to high integrity impacts.

Technical Details of CVE-2023-28372

This section provides a technical overview of the CVE, including the vulnerability description, affected systems and versions, and the exploitation mechanism.

Vulnerability Description

The vulnerability in FlashBlade Purity (OE) Version 4.1.0 allows users with specific privileges to manipulate the object lock's availability by extending an object's retention period.

Affected Systems and Versions

Only FlashBlade Purity (OE) Version 4.1.0 is affected by this vulnerability. Users of this specific version are at risk of exploitation.

Exploitation Mechanism

To exploit this vulnerability, a user with high privileges must extend an object's retention period, thereby impacting the availability of the object lock.

Mitigation and Prevention

In this section, essential steps to mitigate the CVE-2023-28372 vulnerability are discussed to secure systems and prevent potential exploits.

Immediate Steps to Take

Users of FlashBlade Purity (OE) Version 4.1.0 should update to version 4.1.1 or later to address and resolve the privilege escalation vulnerability effectively.

Long-Term Security Practices

Regularly updating software, monitoring privileged access, and enforcing the principle of least privilege can help prevent similar vulnerabilities and enhance overall system security.

Patching and Updates

Pure Storage has released a solution for CVE-2023-28372, starting with FlashBlade Purity (OE) version 4.1.1. It is crucial for users to promptly apply patches and updates to safeguard their systems from potential security risks.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now