CVE-2023-43040

6.5 MEDIUM

📋 TL;DR

This vulnerability in IBM Spectrum Fusion HCI allows attackers to perform unauthorized actions in RGW (RADOS Gateway) for Ceph due to improper bucket access controls. Attackers could potentially read, modify, or delete data in Ceph object storage buckets they shouldn't have access to. Affected systems are IBM Spectrum Fusion HCI versions 2.5.2 through 2.7.2.

💻 Affected Systems

Products:
  • IBM Spectrum Fusion HCI
Versions: 2.5.2 through 2.7.2
Operating Systems: Linux-based systems running IBM Spectrum Fusion HCI
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Ceph RGW (RADOS Gateway) component within IBM Spectrum Fusion HCI deployments. Requires access to the RGW interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Ceph object storage data including unauthorized data access, modification, or deletion across multiple buckets, potentially leading to data loss, data integrity issues, or service disruption.

🟠

Likely Case

Unauthorized access to specific buckets containing sensitive data, potentially exposing confidential information or allowing data manipulation.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls are in place, with potential for detection through monitoring of bucket access patterns.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires some level of access to the RGW interface and understanding of Ceph bucket permissions. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IBM Spectrum Fusion HCI 2.7.3 and later

Vendor Advisory: https://www.ibm.com/support/pages/node/7151040

Restart Required: Yes

Instructions:

1. Review IBM advisory at the provided URL. 2. Apply IBM Spectrum Fusion HCI update to version 2.7.3 or later. 3. Follow IBM's documented update procedures for Spectrum Fusion HCI. 4. Restart affected services as required by the update process.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to RGW endpoints to only trusted networks and authorized users

# Configure firewall rules to restrict access to RGW ports (typically 7480 for HTTP, 7481 for HTTPS)
iptables -A INPUT -p tcp --dport 7480 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 7480 -j DROP

Enhanced Bucket Policy Review

linux

Review and tighten bucket access policies in Ceph RGW

# Review existing bucket policies
radosgw-admin bucket list
# Check specific bucket policies
radosgw-admin bucket policy --bucket=bucket_name

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RGW endpoints from untrusted networks
  • Enhance monitoring of bucket access patterns and implement alerting for unusual access attempts

🔍 How to Verify

Check if Vulnerable:

Check IBM Spectrum Fusion HCI version: Run 'ibm-spectrum-fusion version' or check the management interface for version information. If version is between 2.5.2 and 2.7.2 inclusive, the system is vulnerable.

Check Version:

ibm-spectrum-fusion version

Verify Fix Applied:

Verify version is 2.7.3 or later using 'ibm-spectrum-fusion version' command. Test bucket access controls by attempting unauthorized access (in a controlled manner) to verify proper enforcement.

📡 Detection & Monitoring

Log Indicators:

  • Unusual bucket access patterns in Ceph RGW logs
  • Failed authentication attempts followed by successful bucket access
  • Access to buckets from unexpected IP addresses or users

Network Indicators:

  • Unusual traffic patterns to RGW endpoints (ports 7480/7481)
  • Multiple bucket enumeration attempts
  • Unexpected S3 API calls to restricted buckets

SIEM Query:

source="ceph-rgw" AND (bucket_access OR bucket_operation) AND (user NOT IN allowed_users OR src_ip NOT IN allowed_networks)

🔗 References

📤 Share & Export