CVE-2023-4334

7.5 HIGH

📋 TL;DR

The Broadcom RAID Controller Web server (nginx) exposes private files without requiring authentication. This vulnerability allows unauthorized users to access sensitive system files. Organizations using affected Broadcom RAID Controllers with web management interfaces are at risk.

💻 Affected Systems

Products:
  • Broadcom RAID Controller with web management interface
Versions: Specific versions not detailed in provided references; check Broadcom advisories
Operating Systems: Any OS running Broadcom RAID Controller web interface
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with the web management interface enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access sensitive configuration files, credentials, or system logs, potentially leading to full system compromise or data exfiltration.

🟠

Likely Case

Unauthorized access to system configuration files and logs, enabling reconnaissance for further attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external access.

🌐 Internet-Facing: HIGH - Web servers exposed to the internet allow direct unauthenticated file access.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could access sensitive files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Simple HTTP requests to access files.

Exploitation requires network access to the web server; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Broadcom security advisory for specific patched versions

Vendor Advisory: https://www.broadcom.com/support/resources/product-security-center

Restart Required: Yes

Instructions:

1. Check Broadcom advisory for affected products. 2. Download and apply the latest firmware/software update from Broadcom. 3. Restart the RAID controller or host system as required.

🔧 Temporary Workarounds

Disable Web Interface

all

Turn off the web management interface if not required.

Specific commands vary by product; consult Broadcom documentation

Network Access Control

linux

Restrict network access to the web interface using firewalls or VLANs.

iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the RAID controller from untrusted networks.
  • Monitor access logs for unauthorized file access attempts and set up alerts.

🔍 How to Verify

Check if Vulnerable:

Attempt to access known private file paths via HTTP/HTTPS without authentication (e.g., curl http://controller-ip/private/file).

Check Version:

Check firmware version via RAID controller management interface or CLI (command varies by product).

Verify Fix Applied:

After patching, repeat the check; access should be denied or require authentication.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to requests for private file paths from unauthorized IPs
  • Unusual access patterns to web server logs

Network Indicators:

  • HTTP GET requests to sensitive file paths from external IPs
  • Increased traffic to web interface on non-standard ports

SIEM Query:

source="web_server_logs" AND (url_path="/private/*" OR url_path="/config/*") AND response_code=200

🔗 References

📤 Share & Export