Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-28373 : Security Advisory and Response

Learn about CVE-2023-28373 in FlashArray Purity, impacting data availability, SafeMode snapshots, and the necessary mitigation steps to secure systems.

This CVE-2023-28373 details a vulnerability in FlashArray Purity that allows an array administrator, by configuring an external key manager, to impact the availability of data on the system, including SafeMode-protected snapshots.

Understanding CVE-2023-28373

This section delves deeper into what CVE-2023-28373 entails, its implications, and how it can affect systems.

What is CVE-2023-28373?

The vulnerability in FlashArray Purity allows an array administrator to influence data availability on the system, including snapshots protected by SafeMode. This flaw poses potential risks to the integrity and accessibility of critical data.

The Impact of CVE-2023-28373

With this vulnerability, unauthorized configurations by an array administrator could compromise the availability of data and SafeMode-protected snapshots, leading to potential data loss or unauthorized access to sensitive information.

Technical Details of CVE-2023-28373

This section provides more technical insights into the vulnerability, affected systems, and the mechanism of exploitation.

Vulnerability Description

The flaw in FlashArray Purity allows an array administrator to impact data availability by configuring an external key manager, potentially compromising the security of snapshots under SafeMode protection.

Affected Systems and Versions

        FlashArray Purity versions:
              6.1.0 to 6.1.22
              6.2.0 to 6.2.15
              6.3.0 to 6.3.6
              6.4.0

Exploitation Mechanism

The vulnerability can be exploited by malicious actors manipulating the configuration of an external key manager within FlashArray Purity, affecting the availability of data and SafeMode-protected snapshots.

Mitigation and Prevention

To address CVE-2023-28373 and prevent potential exploits, immediate actions and long-term security practices should be implemented.

Immediate Steps to Take

        Monitor system configurations and access controls related to external key managers.
        Implement stricter access controls for administrators to prevent unauthorized configurations.
        Apply security patches and updates as soon as possible.

Long-Term Security Practices

        Regular security audits and assessments to identify vulnerabilities.
        Employee training on secure configuration management practices.
        Implementing multi-factor authentication and role-based access controls.

Patching and Updates

The vulnerability is resolved in updated versions of FlashArray Purity (OE):

        6.1.23 or later
        6.2.16 or later
        6.3.7 or later
        6.4.1 or later

By applying these updates, organizations can mitigate the risks associated with CVE-2023-28373 and enhance the security of their systems.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now