Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-4976

Summary
Assigner-PureStorage
Assigner Org ID-3895c224-4e1d-482a-adb3-fa64795683ac
Published At-17 Jul, 2024 | 15:25
Updated At-10 Apr, 2025 | 14:18
Rejected At-
Credits

FlashBlade Authentication Mechanism Vulnerability

A flaw exists in FlashBlade whereby a local account is permitted to authenticate to the management interface using an unintended method that allows an attacker to gain privileged access to the array.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:PureStorage
Assigner Org ID:3895c224-4e1d-482a-adb3-fa64795683ac
Published At:17 Jul, 2024 | 15:25
Updated At:10 Apr, 2025 | 14:18
Rejected At:
▼CVE Numbering Authority (CNA)
FlashBlade Authentication Mechanism Vulnerability

A flaw exists in FlashBlade whereby a local account is permitted to authenticate to the management interface using an unintended method that allows an attacker to gain privileged access to the array.

Affected Products
Vendor
PureStorage
Product
FlashBlade
Platforms
  • Purity//FB
Default Status
unaffected
Versions
Affected
  • From 3.3.5 through 3.3.10 (custom)
  • From 4.0.4 through 4.0.6 (custom)
  • From 4.1.0 through 4.1.8 (custom)
  • From 4.2.0 through 4.2.2 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-269CWE-269 Improper Privilege Management
Type: CWE
CWE ID: CWE-269
Description: CWE-269 Improper Privilege Management
Metrics
VersionBase scoreBase severityVector
4.09.3CRITICAL
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 9.3
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-233CAPEC-233 Privilege Escalation
CAPEC ID: CAPEC-233
Description: CAPEC-233 Privilege Escalation
Solutions

This vulnerability can be fixed either by applying a patch or upgrading to an unaffected Purity version. This issue is resolved in the following FlashBlade Purity versions: * Purity//FB 3.3.11 or later * Purity//FB 4.1.9 or later * Purity//FB 4.2.3 or later * Purity//FB 4.3.0 or later * Purity//FB 4.4.0 or later

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.purestorage.com/security
N/A
Hyperlink: https://www.purestorage.com/security
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Vendor
purestorage
Product
flashblade
CPEs
  • cpe:2.3:a:purestorage:flashblade:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 3.3.5 through 3.3.10 (custom)
  • From 4.0.4 through 4.0.6 (custom)
  • From 4.1.0 through 4.1.8 (custom)
  • From 4.2.0 through 4.2.2 (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://purestorage.com/security
x_transferred
Hyperlink: https://purestorage.com/security
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@purestorage.com
Published At:17 Jul, 2024 | 16:15
Updated At:18 Jul, 2024 | 12:28

A flaw exists in Purity//FB whereby a local account is permitted to authenticate to the management interface using an unintended method that allows an attacker to gain privileged access to the array.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.09.3CRITICAL
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 4.0
Base score: 9.3
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-269Secondarypsirt@purestorage.com
CWE ID: CWE-269
Type: Secondary
Source: psirt@purestorage.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://purestorage.com/securitypsirt@purestorage.com
N/A
Hyperlink: https://purestorage.com/security
Source: psirt@purestorage.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

4Records found

CVE-2023-36628
Matching Score-6
Assigner-Pure Storage, Inc.
ShareView Details
Matching Score-6
Assigner-Pure Storage, Inc.
CVSS Score-8.8||HIGH
EPSS-0.17% / 38.37%
||
7 Day CHG~0.00%
Published-02 Oct, 2023 | 23:15
Updated-23 Sep, 2024 | 14:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Privilege Escalation in VASA

A flaw exists in VASA which allows users with access to a vSphere/ESXi VMware admin on a FlashArray to gain root access through privilege escalation.

Action-Not Available
Vendor-purestoragePure Storage
Product-purity\/\/faFlashArray Purity
CWE ID-CWE-269
Improper Privilege Management
CVE-2024-3057
Matching Score-6
Assigner-Pure Storage, Inc.
ShareView Details
Matching Score-6
Assigner-Pure Storage, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.20% / 42.01%
||
7 Day CHG~0.00%
Published-08 Oct, 2024 | 16:50
Updated-10 Apr, 2025 | 14:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw exists whereby a user can make a specific call to a FlashArray endpoint allowing privilege escalation.

Action-Not Available
Vendor-PureStoragepurestorage
Product-FlashArrayflasharray
CWE ID-CWE-269
Improper Privilege Management
CVE-2024-0003
Matching Score-6
Assigner-Pure Storage, Inc.
ShareView Details
Matching Score-6
Assigner-Pure Storage, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.21% / 43.50%
||
7 Day CHG~0.00%
Published-23 Sep, 2024 | 17:27
Updated-27 Sep, 2024 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A condition exists in FlashArray Purity whereby a malicious user could use a remote administrative service to create an account on the array allowing privileged access.

Action-Not Available
Vendor-purestoragePureStoragepurestorage
Product-purity\/\/faFlashArrayflasharray
CWE ID-CWE-269
Improper Privilege Management
CVE-2025-34143
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-3.98% / 87.94%
||
7 Day CHG+0.31%
Published-22 Jul, 2025 | 12:31
Updated-22 Jul, 2025 | 13:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ETQ Reliance CG Authentication Bypass via Trailing Space RCE

An authentication bypass vulnerability exists in ETQ Reliance on the CG (legacy) platform. The application allowed login as the privileged internal SYSTEM user by manipulating the username field. The SYSTEM account does not require a password, enabling attackers with network access to the login page to obtain elevated access. Once authenticated, an attacker could achieve remote code execution by modifying Jython scripts within the application. This issue was resolved by introducing stricter validation logic to exclude internal accounts from public authentication workflows in version MP-4583.

Action-Not Available
Vendor-ETQ
Product-Reliance CG (legacy)
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Details not found