CVE-2023-4336

9.8 CRITICAL

📋 TL;DR

CVE-2023-4336 exposes Broadcom RAID Controller web interfaces to session hijacking attacks because HTTP cookies lack the Secure attribute, allowing them to be transmitted over unencrypted connections. This affects organizations using Broadcom RAID Controllers with web management interfaces. Attackers can intercept cookies to gain unauthorized access to storage management systems.

💻 Affected Systems

Products:
  • Broadcom RAID Controllers with web management interface
Versions: Specific versions not detailed in provided references; consult Broadcom advisory for exact affected versions.
Operating Systems: All operating systems where affected RAID controllers are deployed
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default HTTP configuration; HTTPS configuration may mitigate risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full administrative compromise of RAID storage systems leading to data destruction, ransomware deployment, or exfiltration of sensitive data.

🟠

Likely Case

Unauthorized access to storage management interface allowing configuration changes, performance degradation, or data exposure.

🟢

If Mitigated

Limited impact if HTTPS is enforced and network segmentation restricts access to management interfaces.

🌐 Internet-Facing: HIGH - Web interfaces exposed to internet are directly vulnerable to cookie interception.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires intercepting HTTP traffic containing session cookies, which is straightforward with network access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Broadcom advisory for specific patched firmware versions

Vendor Advisory: https://www.broadcom.com/support/resources/product-security-center

Restart Required: Yes

Instructions:

1. Check Broadcom advisory for affected controller models and firmware versions. 2. Download updated firmware from Broadcom support portal. 3. Apply firmware update following Broadcom documentation. 4. Verify Secure attribute is set on cookies after update.

🔧 Temporary Workarounds

Enforce HTTPS Only

all

Configure web interface to use HTTPS exclusively and disable HTTP access

Refer to Broadcom RAID Controller documentation for HTTPS configuration steps

Network Segmentation

all

Restrict access to RAID controller management interface to trusted networks only

Configure firewall rules to allow access only from management VLANs

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RAID controllers from untrusted networks
  • Deploy web application firewall (WAF) to monitor and block cookie manipulation attempts

🔍 How to Verify

Check if Vulnerable:

Inspect web interface cookies using browser developer tools; check if Secure attribute is missing on session cookies when accessing via HTTP

Check Version:

Check firmware version through RAID controller web interface or management software

Verify Fix Applied:

After patching, verify cookies have Secure attribute set and HTTP access is disabled or redirected to HTTPS

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful login from unusual IP
  • Configuration changes from unexpected sources

Network Indicators:

  • HTTP traffic to RAID controller management ports containing session cookies
  • Unencrypted authentication traffic to controller management interface

SIEM Query:

source_ip=RAID_CONTROLLER_IP AND (http_cookie CONTAINS "session" OR http_cookie CONTAINS "auth") AND NOT protocol="HTTPS"

🔗 References

📤 Share & Export