CVE-2023-43040
📋 TL;DR
This vulnerability in IBM Spectrum Fusion HCI allows attackers to perform unauthorized actions in RGW (RADOS Gateway) for Ceph due to improper bucket access controls. Attackers could potentially read, modify, or delete data in Ceph object storage buckets they shouldn't have access to. Affected systems are IBM Spectrum Fusion HCI versions 2.5.2 through 2.7.2.
💻 Affected Systems
- IBM Spectrum Fusion HCI
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of Ceph object storage data including unauthorized data access, modification, or deletion across multiple buckets, potentially leading to data loss, data integrity issues, or service disruption.
Likely Case
Unauthorized access to specific buckets containing sensitive data, potentially exposing confidential information or allowing data manipulation.
If Mitigated
Limited impact if proper network segmentation and access controls are in place, with potential for detection through monitoring of bucket access patterns.
🎯 Exploit Status
Exploitation requires some level of access to the RGW interface and understanding of Ceph bucket permissions. No public exploit code has been identified.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: IBM Spectrum Fusion HCI 2.7.3 and later
Vendor Advisory: https://www.ibm.com/support/pages/node/7151040
Restart Required: Yes
Instructions:
1. Review IBM advisory at the provided URL. 2. Apply IBM Spectrum Fusion HCI update to version 2.7.3 or later. 3. Follow IBM's documented update procedures for Spectrum Fusion HCI. 4. Restart affected services as required by the update process.
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict network access to RGW endpoints to only trusted networks and authorized users
# Configure firewall rules to restrict access to RGW ports (typically 7480 for HTTP, 7481 for HTTPS)
iptables -A INPUT -p tcp --dport 7480 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 7480 -j DROP
Enhanced Bucket Policy Review
linuxReview and tighten bucket access policies in Ceph RGW
# Review existing bucket policies
radosgw-admin bucket list
# Check specific bucket policies
radosgw-admin bucket policy --bucket=bucket_name
🧯 If You Can't Patch
- Implement strict network segmentation to isolate RGW endpoints from untrusted networks
- Enhance monitoring of bucket access patterns and implement alerting for unusual access attempts
🔍 How to Verify
Check if Vulnerable:
Check IBM Spectrum Fusion HCI version: Run 'ibm-spectrum-fusion version' or check the management interface for version information. If version is between 2.5.2 and 2.7.2 inclusive, the system is vulnerable.
Check Version:
ibm-spectrum-fusion version
Verify Fix Applied:
Verify version is 2.7.3 or later using 'ibm-spectrum-fusion version' command. Test bucket access controls by attempting unauthorized access (in a controlled manner) to verify proper enforcement.
📡 Detection & Monitoring
Log Indicators:
- Unusual bucket access patterns in Ceph RGW logs
- Failed authentication attempts followed by successful bucket access
- Access to buckets from unexpected IP addresses or users
Network Indicators:
- Unusual traffic patterns to RGW endpoints (ports 7480/7481)
- Multiple bucket enumeration attempts
- Unexpected S3 API calls to restricted buckets
SIEM Query:
source="ceph-rgw" AND (bucket_access OR bucket_operation) AND (user NOT IN allowed_users OR src_ip NOT IN allowed_networks)
🔗 References
- https://exchange.xforce.ibmcloud.com/vulnerabilities/266807
- https://www.ibm.com/support/pages/node/7151040
- https://exchange.xforce.ibmcloud.com/vulnerabilities/266807
- https://lists.debian.org/debian-lts-announce/2023/10/msg00034.html
- https://lists.debian.org/debian-lts-announce/2025/09/msg00025.html
- https://www.ibm.com/support/pages/node/7151040