Learn about CVE-2023-28372, a Medium severity vulnerability in FlashBlade Purity (OE) Version 4.1.0 allowing users to extend object retention period and impact object lock availability.
This CVE, assigned by PureStorage, involves a vulnerability in FlashBlade Purity (OE) Version 4.1.0 that allows a user with privileges to extend an object’s retention period to affect the availability of the object lock.
Understanding CVE-2023-28372
This section delves into the details of CVE-2023-28372, explaining the vulnerability and its impact, along with the technical aspects.
What is CVE-2023-28372?
The flaw in FlashBlade Purity (OE) Version 4.1.0 allows a privileged user to influence the availability of the object lock by extending an object's retention period. This issue poses a risk to the integrity and availability of the system.
The Impact of CVE-2023-28372
With a CVSS base score of 6.5 (Medium severity), this vulnerability has a significant impact on the availability of the FlashBlade Object Store. It requires high privileges to exploit and can lead to high integrity impacts.
Technical Details of CVE-2023-28372
This section provides a technical overview of the CVE, including the vulnerability description, affected systems and versions, and the exploitation mechanism.
Vulnerability Description
The vulnerability in FlashBlade Purity (OE) Version 4.1.0 allows users with specific privileges to manipulate the object lock's availability by extending an object's retention period.
Affected Systems and Versions
Only FlashBlade Purity (OE) Version 4.1.0 is affected by this vulnerability. Users of this specific version are at risk of exploitation.
Exploitation Mechanism
To exploit this vulnerability, a user with high privileges must extend an object's retention period, thereby impacting the availability of the object lock.
Mitigation and Prevention
In this section, essential steps to mitigate the CVE-2023-28372 vulnerability are discussed to secure systems and prevent potential exploits.
Immediate Steps to Take
Users of FlashBlade Purity (OE) Version 4.1.0 should update to version 4.1.1 or later to address and resolve the privilege escalation vulnerability effectively.
Long-Term Security Practices
Regularly updating software, monitoring privileged access, and enforcing the principle of least privilege can help prevent similar vulnerabilities and enhance overall system security.
Patching and Updates
Pure Storage has released a solution for CVE-2023-28372, starting with FlashBlade Purity (OE) version 4.1.1. It is crucial for users to promptly apply patches and updates to safeguard their systems from potential security risks.