CVE-2023-36628

8.8 HIGH

📋 TL;DR

This vulnerability allows users with VMware admin access on a FlashArray to escalate privileges to root through VASA. It affects VMware vSphere/ESXi environments integrated with Pure Storage FlashArray systems. Attackers with existing admin access can gain full system control.

💻 Affected Systems

Products:
  • Pure Storage FlashArray with VASA Provider
Versions: VASA Provider versions prior to 6.2.4
Operating Systems: VMware vSphere/ESXi
Default Config Vulnerable: ⚠️ Yes
Notes: Requires VASA integration between VMware and Pure Storage FlashArray. Only affects environments where VMware admins have access to FlashArray management.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the FlashArray system, allowing attackers to access, modify, or delete all storage data, disrupt operations, and potentially pivot to connected systems.

🟠

Likely Case

Privileged VMware administrators exploiting the flaw to gain root access on FlashArray for unauthorized data access or configuration changes.

🟢

If Mitigated

Limited impact if strict access controls, network segmentation, and monitoring are in place to detect privilege escalation attempts.

🌐 Internet-Facing: LOW - VASA typically operates in internal management networks and is not directly internet-facing.
🏢 Internal Only: HIGH - Exploitable by authenticated VMware admins within the internal network, posing significant risk to storage infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires existing VMware admin credentials. The vulnerability is in the privilege escalation mechanism, making it straightforward for authenticated attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: VASA Provider 6.2.4 or later

Vendor Advisory: https://support.purestorage.com/Pure_Storage_Technical_Services/Field_Bulletins/Security_Bulletins/Security_Bulletin_for_Privilege_Escalation_in_VASA_CVE-2023-36628

Restart Required: Yes

Instructions:

1. Download VASA Provider 6.2.4+ from Pure Storage support portal. 2. Deploy the new VASA Provider OVA to vSphere. 3. Register the new provider with vCenter. 4. Remove the old VASA Provider. 5. Verify integration functionality.

🔧 Temporary Workarounds

Restrict VMware Admin Access

all

Limit VMware administrator accounts that have access to FlashArray management interfaces.

Network Segmentation

all

Isolate FlashArray management interfaces from general VMware admin networks.

🧯 If You Can't Patch

  • Implement strict access controls and least privilege for VMware admin accounts
  • Enable detailed logging and monitoring of FlashArray management activities

🔍 How to Verify

Check if Vulnerable:

Check VASA Provider version in vCenter under Storage Providers or via Pure Storage FlashArray management interface.

Check Version:

Connect to FlashArray GUI or CLI and check VASA Provider version, or check in vCenter Storage Providers section.

Verify Fix Applied:

Confirm VASA Provider version is 6.2.4 or later and test that VMware admin users cannot escalate to root on FlashArray.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation attempts in FlashArray logs
  • Root access from VMware admin accounts
  • Unauthorized configuration changes

Network Indicators:

  • Unexpected management traffic between VMware and FlashArray
  • Authentication anomalies

SIEM Query:

source="flasharray" AND (event="privilege_escalation" OR user="root" AND source_user="vmware_admin")

🔗 References

📤 Share & Export