CVE-2023-28088

7.8 HIGH

📋 TL;DR

CVE-2023-28088 is a vulnerability in HPE OneView where diagnostic dumps may expose SAN switch administrative credentials. This affects HPE OneView users who have configured SAN switch management. Attackers who obtain these dumps could gain administrative access to SAN infrastructure.

💻 Affected Systems

Products:
  • HPE OneView
Versions: All versions prior to 8.4
Operating Systems: Linux-based appliance
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects configurations where SAN switch management is enabled in HPE OneView.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative credentials to SAN switches, allowing them to reconfigure storage networks, disrupt operations, or exfiltrate sensitive data from storage systems.

🟠

Likely Case

Internal attackers or those with access to diagnostic files obtain SAN switch credentials, potentially leading to unauthorized storage network modifications.

🟢

If Mitigated

With proper access controls and monitoring, credential exposure is limited, and compromised credentials can be quickly detected and rotated.

🌐 Internet-Facing: LOW - This requires access to diagnostic dumps which are typically not internet-accessible.
🏢 Internal Only: HIGH - Internal users or attackers with network access could potentially obtain diagnostic dumps containing credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to diagnostic dump files, which typically requires some level of system access or privilege.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: HPE OneView 8.4

Vendor Advisory: https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04469en_us

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download HPE OneView 8.4 from HPE support portal. 3. Follow HPE OneView upgrade documentation. 4. Verify upgrade completion and functionality.

🔧 Temporary Workarounds

Restrict diagnostic dump access

linux

Limit access to diagnostic dump files and directories to authorized administrators only.

chmod 600 /path/to/diagnostic/dumps
chown root:root /path/to/diagnostic/dumps

Rotate SAN switch credentials

all

Change SAN switch administrative credentials to limit exposure window.

🧯 If You Can't Patch

  • Implement strict access controls on diagnostic dump directories and files
  • Regularly rotate SAN switch administrative credentials and monitor for unauthorized access

🔍 How to Verify

Check if Vulnerable:

Check HPE OneView version via web interface or CLI. Versions below 8.4 are vulnerable if SAN switch management is configured.

Check Version:

ovcli version

Verify Fix Applied:

Verify HPE OneView version is 8.4 or later and confirm diagnostic dumps no longer contain plaintext SAN credentials.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access to diagnostic dump files
  • Unexpected SAN switch configuration changes

Network Indicators:

  • Unusual SAN switch management traffic from unexpected sources

SIEM Query:

source="hpe_oneview" AND (event="diagnostic_dump_access" OR event="san_config_change")

🔗 References

📤 Share & Export