Learn about CVE-2023-32572 affecting FlashArray Purity by Pure Storage, allowing unauthorized bypass of SafeMode protection via retention lock alteration. Get mitigation steps and version updates.
A detailed analysis of CVE-2023-32572 affecting FlashArray Purity by Pure Storage.
Understanding CVE-2023-32572
This section provides insights into the vulnerability and its impact.
What is CVE-2023-32572?
A flaw exists in FlashArray Purity, allowing an array administrator to bypass pgroup SafeMode protection by altering the retention lock under specific conditions.
The Impact of CVE-2023-32572
The vulnerability can lead to a high impact on integrity, with a CVSS base score of 6.5, affecting confidentiality and availability under certain privileges.
Technical Details of CVE-2023-32572
Explore the specifics of the vulnerability in this section.
Vulnerability Description
The flaw in FlashArray Purity enables unauthorized changes to the retention lock, potentially compromising system security.
Affected Systems and Versions
FlashArray Purity versions 6.3.0 to 6.3.7 and 6.4.0 to 6.4.1 are vulnerable to this issue.
Exploitation Mechanism
The vulnerability can be exploited by an array administrator with high privileges, impacting system integrity and availability.
Mitigation and Prevention
Discover the steps to mitigate and prevent exploitation of CVE-2023-32572.
Immediate Steps to Take
Upgrade to FlashArray Purity versions 6.3.8 or later, 6.4.3 or newer to address this vulnerability effectively.
Long-Term Security Practices
Implement robust access controls and regular security assessments to enhance overall system security.
Patching and Updates
Continuously monitor for security updates and promptly apply patches to ensure system safety and integrity.